No analysis available yet.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | VMware ESXi, VMware Cloud Foundation | affected |
|
Configuration 1 [-]
|
No data.
No data available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-53116 | VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox. |
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00548.
Exploitation none
Automatable no
Technical Impact total
Tue, 22 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-04-22T15:51:48.328Z
Reserved: 2022-05-25T00:00:00.000Z
Link: CVE-2022-31696
Updated: 2024-08-03T07:26:01.074Z
Status : Modified
Published: 2022-12-13T16:15:19.733
Modified: 2025-04-22T16:15:29.273
Link: CVE-2022-31696
No data.
OpenCVE Enrichment
No data.
EUVD