CVE-2020-3943 — Improper Input Validation in Vmware Vrealize Operations
Severity
9.8CRITICALNVD
EPSS
1.7%
top 17.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 19
Latest updateMay 24
Description
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) uses a JMX RMI service which is not securely configured. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to execute arbitrary code in vRealize Operations.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
▶CVEListV5vmware/vrealize_operations_for_horizon_adapter6.6.x prior to 6.6.1, 6.7.x prior to 6.7.1+1
🔴Vulnerability Details
2📋Vendor Advisories
1VMware▶
vRealize Operations for Horizon Adapter updates address multiple security vulnerabilities (CVE-2020-3943, CVE-2020-3944, CVE-2020-3945)↗2020-02-18