VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2020-0026.html | Patch Vendor Advisory |
https://www.vmware.com/security/advisories/VMSA-2020-0026.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vmware.com/security/advisories/VMSA-2020-0026.html - Patch, Vendor Advisory |
Information
Published : 2020-11-20 20:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4005
Mitre link : CVE-2020-4005
CVE.ORG link : CVE-2020-4005
JSON object : View
Products Affected
vmware
- esxi
- cloud_foundation
CWE