Lucene search

K
cveVmwareCVE-2020-3968
HistoryJun 25, 2020 - 3:15 p.m.

CVE-2020-3968

2020-06-2515:15:11
CWE-787
vmware
web.nvd.nist.gov
45
vmware
esxi
workstation
fusion
usb 3.0
vulnerability
out-of-bounds write
xhci
denial of service
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

39.6%

VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine’s vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker’s control must be present for exploitation to be possible.

Affected configurations

Nvd
Node
vmwarecloud_foundationRange3.03.10
OR
vmwarecloud_foundationRange4.0.04.0.1
OR
vmwarefusionRange11.0.011.5.5
OR
vmwareworkstationRange15.0.015.5.5
OR
vmwareesxiMatch6.5-
OR
vmwareesxiMatch6.5650-201701001
OR
vmwareesxiMatch6.5650-201703001
OR
vmwareesxiMatch6.5650-201703002
OR
vmwareesxiMatch6.5650-201704001
OR
vmwareesxiMatch6.5650-201707101
OR
vmwareesxiMatch6.5650-201707102
OR
vmwareesxiMatch6.5650-201707103
OR
vmwareesxiMatch6.5650-201707201
OR
vmwareesxiMatch6.5650-201707202
OR
vmwareesxiMatch6.5650-201707203
OR
vmwareesxiMatch6.5650-201707204
OR
vmwareesxiMatch6.5650-201707205
OR
vmwareesxiMatch6.5650-201707206
OR
vmwareesxiMatch6.5650-201707207
OR
vmwareesxiMatch6.5650-201707208
OR
vmwareesxiMatch6.5650-201707209
OR
vmwareesxiMatch6.5650-201707210
OR
vmwareesxiMatch6.5650-201707211
OR
vmwareesxiMatch6.5650-201707212
OR
vmwareesxiMatch6.5650-201707213
OR
vmwareesxiMatch6.5650-201707214
OR
vmwareesxiMatch6.5650-201707215
OR
vmwareesxiMatch6.5650-201707216
OR
vmwareesxiMatch6.5650-201707217
OR
vmwareesxiMatch6.5650-201707218
OR
vmwareesxiMatch6.5650-201707219
OR
vmwareesxiMatch6.5650-201707220
OR
vmwareesxiMatch6.5650-201707221
OR
vmwareesxiMatch6.5650-201710001
OR
vmwareesxiMatch6.5650-201712001
OR
vmwareesxiMatch6.5650-201803001
OR
vmwareesxiMatch6.5650-201806001
OR
vmwareesxiMatch6.5650-201808001
OR
vmwareesxiMatch6.5650-201810001
OR
vmwareesxiMatch6.5650-201810002
OR
vmwareesxiMatch6.5650-201811001
OR
vmwareesxiMatch6.5650-201811002
OR
vmwareesxiMatch6.5650-201811301
OR
vmwareesxiMatch6.5650-201901001
OR
vmwareesxiMatch6.5650-201903001
OR
vmwareesxiMatch6.5650-201905001
OR
vmwareesxiMatch6.5650-201908001
OR
vmwareesxiMatch6.5650-201910001
OR
vmwareesxiMatch6.5650-20191004001
OR
vmwareesxiMatch6.5650-201911001
OR
vmwareesxiMatch6.5650-201911401
OR
vmwareesxiMatch6.5650-201911402
OR
vmwareesxiMatch6.5650-201912001
OR
vmwareesxiMatch6.5650-201912002
OR
vmwareesxiMatch6.5650-201912101
OR
vmwareesxiMatch6.5650-201912102
OR
vmwareesxiMatch6.5650-201912103
OR
vmwareesxiMatch6.5650-201912104
OR
vmwareesxiMatch6.5650-201912301
OR
vmwareesxiMatch6.5650-201912401
OR
vmwareesxiMatch6.5650-201912402
OR
vmwareesxiMatch6.5650-201912403
OR
vmwareesxiMatch6.5650-201912404
OR
vmwareesxiMatch6.5650-202005001
OR
vmwareesxiMatch6.7-
OR
vmwareesxiMatch6.7670-201806001
OR
vmwareesxiMatch6.7670-201807001
OR
vmwareesxiMatch6.7670-201808001
OR
vmwareesxiMatch6.7670-201810001
OR
vmwareesxiMatch6.7670-201810101
OR
vmwareesxiMatch6.7670-201810102
OR
vmwareesxiMatch6.7670-201810103
OR
vmwareesxiMatch6.7670-201810201
OR
vmwareesxiMatch6.7670-201810202
OR
vmwareesxiMatch6.7670-201810203
OR
vmwareesxiMatch6.7670-201810204
OR
vmwareesxiMatch6.7670-201810205
OR
vmwareesxiMatch6.7670-201810206
OR
vmwareesxiMatch6.7670-201810207
OR
vmwareesxiMatch6.7670-201810208
OR
vmwareesxiMatch6.7670-201810209
OR
vmwareesxiMatch6.7670-201810210
OR
vmwareesxiMatch6.7670-201810211
OR
vmwareesxiMatch6.7670-201810212
OR
vmwareesxiMatch6.7670-201810213
OR
vmwareesxiMatch6.7670-201810214
OR
vmwareesxiMatch6.7670-201810215
OR
vmwareesxiMatch6.7670-201810216
OR
vmwareesxiMatch6.7670-201810217
OR
vmwareesxiMatch6.7670-201810218
OR
vmwareesxiMatch6.7670-201810219
OR
vmwareesxiMatch6.7670-201810220
OR
vmwareesxiMatch6.7670-201810221
OR
vmwareesxiMatch6.7670-201810222
OR
vmwareesxiMatch6.7670-201810223
OR
vmwareesxiMatch6.7670-201810224
OR
vmwareesxiMatch6.7670-201810225
OR
vmwareesxiMatch6.7670-201810226
OR
vmwareesxiMatch6.7670-201810227
OR
vmwareesxiMatch6.7670-201810228
OR
vmwareesxiMatch6.7670-201810229
OR
vmwareesxiMatch6.7670-201810230
OR
vmwareesxiMatch6.7670-201810231
OR
vmwareesxiMatch6.7670-201810232
OR
vmwareesxiMatch6.7670-201810233
OR
vmwareesxiMatch6.7670-201810234
OR
vmwareesxiMatch6.7670-201811001
OR
vmwareesxiMatch6.7670-201901001
OR
vmwareesxiMatch6.7670-201901401
OR
vmwareesxiMatch6.7670-201901402
OR
vmwareesxiMatch6.7670-201901403
OR
vmwareesxiMatch6.7670-201903001
OR
vmwareesxiMatch6.7670-201904001
OR
vmwareesxiMatch6.7670-201904201
OR
vmwareesxiMatch6.7670-201904202
OR
vmwareesxiMatch6.7670-201904203
OR
vmwareesxiMatch6.7670-201904204
OR
vmwareesxiMatch6.7670-201904205
OR
vmwareesxiMatch6.7670-201904206
OR
vmwareesxiMatch6.7670-201904207
OR
vmwareesxiMatch6.7670-201904208
OR
vmwareesxiMatch6.7670-201904209
OR
vmwareesxiMatch6.7670-201904210
OR
vmwareesxiMatch6.7670-201904211
OR
vmwareesxiMatch6.7670-201904212
OR
vmwareesxiMatch6.7670-201904213
OR
vmwareesxiMatch6.7670-201904214
OR
vmwareesxiMatch6.7670-201904215
OR
vmwareesxiMatch6.7670-201904216
OR
vmwareesxiMatch6.7670-201904217
OR
vmwareesxiMatch6.7670-201904218
OR
vmwareesxiMatch6.7670-201904219
OR
vmwareesxiMatch6.7670-201904220
OR
vmwareesxiMatch6.7670-201904221
OR
vmwareesxiMatch6.7670-201904222
OR
vmwareesxiMatch6.7670-201904223
OR
vmwareesxiMatch6.7670-201904224
OR
vmwareesxiMatch6.7670-201904225
OR
vmwareesxiMatch6.7670-201904226
OR
vmwareesxiMatch6.7670-201904227
OR
vmwareesxiMatch6.7670-201904228
OR
vmwareesxiMatch6.7670-201904229
OR
vmwareesxiMatch6.7670-201905001
OR
vmwareesxiMatch6.7670-201906002
OR
vmwareesxiMatch6.7670-201908101
OR
vmwareesxiMatch6.7670-201908102
OR
vmwareesxiMatch6.7670-201908103
OR
vmwareesxiMatch6.7670-201908104
OR
vmwareesxiMatch6.7670-201908201
OR
vmwareesxiMatch6.7670-201908202
OR
vmwareesxiMatch6.7670-201908203
OR
vmwareesxiMatch6.7670-201908204
OR
vmwareesxiMatch6.7670-201908205
OR
vmwareesxiMatch6.7670-201908206
OR
vmwareesxiMatch6.7670-201908207
OR
vmwareesxiMatch6.7670-201908208
OR
vmwareesxiMatch6.7670-201908209
OR
vmwareesxiMatch6.7670-201908210
OR
vmwareesxiMatch6.7670-201908211
OR
vmwareesxiMatch6.7670-201908212
OR
vmwareesxiMatch6.7670-201908213
OR
vmwareesxiMatch6.7670-201908214
OR
vmwareesxiMatch6.7670-201908215
OR
vmwareesxiMatch6.7670-201908216
OR
vmwareesxiMatch6.7670-201908217
OR
vmwareesxiMatch6.7670-201908218
OR
vmwareesxiMatch6.7670-201908219
OR
vmwareesxiMatch6.7670-201908220
OR
vmwareesxiMatch6.7670-201908221
OR
vmwareesxiMatch6.7670-201912001
OR
vmwareesxiMatch6.7670-201912101
OR
vmwareesxiMatch6.7670-201912102
OR
vmwareesxiMatch6.7670-201912401
OR
vmwareesxiMatch6.7670-201912402
OR
vmwareesxiMatch6.7670-201912403
OR
vmwareesxiMatch6.7670-201912404
OR
vmwareesxiMatch6.7670-201912405
OR
vmwareesxiMatch6.7670-202004001
OR
vmwareesxiMatch6.7670-202004002
OR
vmwareesxiMatch7.0.0-
VendorProductVersionCPE
vmwarecloud_foundation*cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
vmwarefusion*cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
vmwareworkstation*cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*
vmwareesxi6.5cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*
Rows per page:
1-10 of 1791

CNA Affected

[
  {
    "product": "VMware ESXi",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "7.0 before ESXi_7.0.0-1.20.16321839"
      },
      {
        "status": "affected",
        "version": "6.7 before ESXi670-202004101-SG"
      },
      {
        "status": "affected",
        "version": "6.5 before ESXi650-202005401-SG"
      }
    ]
  },
  {
    "product": "Workstation",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "15.x before 15.5.5"
      }
    ]
  },
  {
    "product": "Fusion",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "11.x before 11.5.5"
      }
    ]
  }
]

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

39.6%