CVE-2020-3999
MEDIUM
6,5
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: none
Integrity: none
Availability: high
LOW
2,1
Source: [email protected]
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial
Description
AI Translation Available
VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0010
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
20
Improper Input Validation
StableCommon Consequences
Security Scopes Affected:
Availability
Confidentiality
Integrity
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Read Memory
Read Files Or Directories
Modify Memory
Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
Application
Fusion by Vmware
Version Range Affected
From
11.5.0
(inclusive)
To
11.5.7
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Workstation by Vmware
Version Range Affected
From
15.0.0
(inclusive)
To
15.5.7
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Esxi by Vmware
CPE Identifier
View Detailed Analysis
cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Esxi by Vmware
CPE Identifier
View Detailed Analysis
cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Esxi by Vmware
CPE Identifier
View Detailed Analysis
cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Esxi by Vmware
CPE Identifier
View Detailed Analysis
cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Esxi by Vmware
CPE Identifier
View Detailed Analysis
cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.vmware.com/security/advisories/VMSA-2020-0029.html
https://www.vmware.com/security/advisories/VMSA-2020-0029.html