Description
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25064 | The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server. |
References
History
Thu, 05 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-02-13T16:40:07.355Z
Reserved: 2022-11-01T15:41:50.394Z
Link: CVE-2023-20893
Updated: 2024-08-02T09:21:33.325Z
Status : Modified
Published: 2023-06-22T12:15:10.490
Modified: 2024-11-21T07:41:46.137
Link: CVE-2023-20893
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD