7.4
CVE-2020-3994
- EPSS 0.13%
- Published 20.10.2020 17:15:12
- Last modified 21.11.2024 05:32:07
- Source security@vmware.com
- Teams watchlist Login
- Open Login
VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.
Data is provided by the National Vulnerability Database (NVD)
VMware ≫ Cloud Foundation Version >= 3.0 < 3.9
VMware ≫ Vcenter Server Version6.5 Update-
VMware ≫ Vcenter Server Version6.5 Updatea
VMware ≫ Vcenter Server Version6.5 Updateb
VMware ≫ Vcenter Server Version6.5 Updatec
VMware ≫ Vcenter Server Version6.5 Updated
VMware ≫ Vcenter Server Version6.5 Updatee
VMware ≫ Vcenter Server Version6.5 Updatef
VMware ≫ Vcenter Server Version6.5 Updateupdate1
VMware ≫ Vcenter Server Version6.5 Updateupdate1b
VMware ≫ Vcenter Server Version6.5 Updateupdate1c
VMware ≫ Vcenter Server Version6.5 Updateupdate1d
VMware ≫ Vcenter Server Version6.5 Updateupdate1e
VMware ≫ Vcenter Server Version6.5 Updateupdate1g
VMware ≫ Vcenter Server Version6.5 Updateupdate2
VMware ≫ Vcenter Server Version6.5 Updateupdate2b
VMware ≫ Vcenter Server Version6.5 Updateupdate2c
VMware ≫ Vcenter Server Version6.5 Updateupdate2d
VMware ≫ Vcenter Server Version6.5 Updateupdate2g
VMware ≫ Vcenter Server Version6.5 Updateupdate3
VMware ≫ Vcenter Server Version6.5 Updateupdate3d
VMware ≫ Vcenter Server Version6.7 Update-
VMware ≫ Vcenter Server Version6.7 Updatea
VMware ≫ Vcenter Server Version6.7 Updateb
VMware ≫ Vcenter Server Version6.7 Updated
VMware ≫ Vcenter Server Version6.7 Updateupdate1
VMware ≫ Vcenter Server Version6.7 Updateupdate1b
VMware ≫ Vcenter Server Version6.7 Updateupdate2
VMware ≫ Vcenter Server Version6.7 Updateupdate2a
VMware ≫ Vcenter Server Version6.7 Updateupdate2c
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.13% | 0.328 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:P/I:P/A:N
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.