CVE-2020-3962Use After Free in Vmware Cloud Foundation

CWE-416Use After Free4 documents4 sources
Severity
8.2HIGHNVD
EPSS
0.1%
top 68.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 24
Latest updateMay 24

Description

VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages7 packages

NVDvmware/fusion11.0.011.5.5
NVDvmware/workstation15.0.015.5.5
NVDvmware/esxi6.5, 6.7, 7.0.0+2
CVEListV5vmware/fusion11.x before 11.5.5
CVEListV5vmware/vmware_esxi6.5 before ESXi650-202005401-SG, 6.7 before ESXi670-202004101-SG, 7.0 before ESXi_7.0.0-1.20.16321839+2

🔴Vulnerability Details

2
GHSA
GHSA-78c8-742h-wm9w: VMware ESXi (72022-05-24
CVEList
CVE-2020-3962: VMware ESXi (72020-06-24

📋Vendor Advisories

1
VMware
VMware Cloud Foundation, ESXi, Workstation, and Fusion updates address multiple security vulnerabilities (CVE-2020-3962, CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3966, CVE-2020-3967, CVE-2020-06-23
CVE-2020-3962 — Use After Free in Vmware | cvebase