First published: Fri Apr 10 2020(Updated: )
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | =6.7 | |
VMware vCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3952 is an information disclosure vulnerability in VMware vCenter Server's VMware Directory Service (vmdir) when the Platform Services Controller (PSC) does not correctly implement access controls.
The severity of CVE-2020-3952 is critical with a CVSS score of 9.8.
CVE-2020-3952 affects VMware vCenter Server by allowing an attacker with network access to port 389 to extract sensitive information.
To fix CVE-2020-3952, it is recommended to upgrade to a patched version of VMware vCenter Server.
You can find more information about CVE-2020-3952 in the references provided: [1](http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html) and [2](https://www.vmware.com/security/advisories/VMSA-2020-0006).