Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00087.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
| Vmware |
|
Configuration 1 [-]
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-53116 | VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 22 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-04-22T15:51:48.328Z
Reserved: 2022-05-25T00:00:00.000Z
Link: CVE-2022-31696
Updated: 2024-08-03T07:26:01.074Z
Status : Modified
Published: 2022-12-13T16:15:19.733
Modified: 2025-04-22T16:15:29.273
Link: CVE-2022-31696
No data.
OpenCVE Enrichment
No data.
EUVD