VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)
Advisories
Source ID Title
EUVD EUVD EUVD-2020-25270 VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:vmware:cloud_foundation:*:*:*:*:*:*:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2024-08-04T07:52:20.623Z

Reserved: 2019-12-30T00:00:00

Link: CVE-2020-4005

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-20T20:15:13.287

Modified: 2025-10-31T11:44:38.620

Link: CVE-2020-4005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.