CVE-2020-3994Improper Certificate Validation in Vmware Cloud Foundation

Severity
7.4HIGHNVD
EPSS
0.1%
top 67.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 20
Latest updateMay 24

Description

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.2

Affected Packages3 packages

CVEListV5vmware/vcenter_servervCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k)
NVDvmware/vcenter_server6.5, 6.7+1
NVDvmware/cloud_foundation3.03.9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cwr2-2v2q-jq6q: VMware vCenter Server (62022-05-24
CVEList
CVE-2020-3994: VMware vCenter Server (62020-10-20

📋Vendor Advisories

1
VMware
VMware ESXi, Workstation, Fusion and NSX-T updates address multiple security vulnerabilities (CVE-2020-3981, CVE-2020-3982, CVE-2020-3992, CVE-2020-3993, CVE-2020-3994, CVE-2020-3995)2020-10-20
CVE-2020-3994 — Improper Certificate Validation | cvebase