Vulnerability Description
The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Vcenter Server | < 7.0 |
Related Weaknesses (CWE)
References
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658
- https://www.vmware.com/security/advisories/VMSA-2023-0014.htmlPatchVendor Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658
- https://www.vmware.com/security/advisories/VMSA-2023-0014.htmlPatchVendor Advisory
FAQ
What is CVE-2023-20894?
CVE-2023-20894 is a vulnerability with a CVSS score of 8.1 (HIGH). The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-boun...
How severe is CVE-2023-20894?
CVE-2023-20894 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-20894?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Vcenter Server.