Description
The vCenter Server contains a partial file read vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to partially read arbitrary files containing sensitive data.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19838 | The vCenter Server contains a partial file read vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to partially read arbitrary files containing sensitive data. |
References
History
Fri, 27 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware cloud Foundation Vmware vcenter Server |
|
| CPEs | cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1e:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:* |
|
| Vendors & Products |
Vmware
Vmware cloud Foundation Vmware vcenter Server |
Thu, 27 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-03-27T19:25:13.775Z
Reserved: 2024-01-08T18:43:18.958Z
Link: CVE-2024-22275
Updated: 2024-08-01T22:43:34.230Z
Status : Analyzed
Published: 2024-05-21T18:15:09.383
Modified: 2025-06-27T13:38:06.967
Link: CVE-2024-22275
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD