
25/6/2020

4/8/2024
CVE-2020-3971
First published: Thu Jun 25 2020(Updated: )
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|
VMware Cloud Foundation | >=3.0<3.7.2 | |
VMware Fusion Pro | >=11.0.0<11.0.2 | |
VMware Workstation | >=15.0.0<15.0.2 | |
VMware ESXi | =6.5 | |
VMware ESXi | =6.5-650-201701001 | |
VMware ESXi | =6.5-650-201703001 | |
VMware ESXi | =6.5-650-201703002 | |
VMware ESXi | =6.5-650-201704001 | |
VMware ESXi | =6.5-650-201707101 | |
VMware ESXi | =6.5-650-201707102 | |
VMware ESXi | =6.5-650-201707103 | |
VMware ESXi | =6.5-650-201707201 | |
VMware ESXi | =6.5-650-201707202 | |
VMware ESXi | =6.5-650-201707203 | |
VMware ESXi | =6.5-650-201707204 | |
VMware ESXi | =6.5-650-201707205 | |
VMware ESXi | =6.5-650-201707206 | |
VMware ESXi | =6.5-650-201707207 | |
VMware ESXi | =6.5-650-201707208 | |
VMware ESXi | =6.5-650-201707209 | |
VMware ESXi | =6.5-650-201707210 | |
VMware ESXi | =6.5-650-201707211 | |
VMware ESXi | =6.5-650-201707212 | |
VMware ESXi | =6.5-650-201707213 | |
VMware ESXi | =6.5-650-201707214 | |
VMware ESXi | =6.5-650-201707215 | |
VMware ESXi | =6.5-650-201707216 | |
VMware ESXi | =6.5-650-201707217 | |
VMware ESXi | =6.5-650-201707218 | |
VMware ESXi | =6.5-650-201707219 | |
VMware ESXi | =6.5-650-201707220 | |
VMware ESXi | =6.5-650-201707221 | |
VMware ESXi | =6.5-650-201710001 | |
VMware ESXi | =6.5-650-201712001 | |
VMware ESXi | =6.5-650-201803001 | |
VMware ESXi | =6.5-650-201806001 | |
VMware ESXi | =6.5-650-201808001 | |
VMware ESXi | =6.5-650-201810001 | |
VMware ESXi | =6.5-650-201810002 | |
VMware ESXi | =6.5-650-201811001 | |
VMware ESXi | =6.5-650-201811002 | |
VMware ESXi | =6.5-650-201811301 | |
VMware ESXi | =6.5-650-201901001 | |
VMware ESXi | =6.5-650-201903001 | |
VMware ESXi | =6.5-650-201905001 | |
VMware ESXi | =6.7 | |
VMware ESXi | =6.7-670-201806001 | |
VMware ESXi | =6.7-670-201807001 | |
VMware ESXi | =6.7-670-201808001 | |
VMware ESXi | =6.7-670-201810001 | |
VMware ESXi | =6.7-670-201810101 | |
VMware ESXi | =6.7-670-201810102 | |
VMware ESXi | =6.7-670-201810103 | |
VMware ESXi | =6.7-670-201810201 | |
VMware ESXi | =6.7-670-201810202 | |
VMware ESXi | =6.7-670-201810203 | |
VMware ESXi | =6.7-670-201810204 | |
VMware ESXi | =6.7-670-201810205 | |
VMware ESXi | =6.7-670-201810206 | |
VMware ESXi | =6.7-670-201810207 | |
VMware ESXi | =6.7-670-201810208 | |
VMware ESXi | =6.7-670-201810209 | |
VMware ESXi | =6.7-670-201810210 | |
VMware ESXi | =6.7-670-201810211 | |
VMware ESXi | =6.7-670-201810212 | |
VMware ESXi | =6.7-670-201810213 | |
VMware ESXi | =6.7-670-201810214 | |
VMware ESXi | =6.7-670-201810215 | |
VMware ESXi | =6.7-670-201810216 | |
VMware ESXi | =6.7-670-201810217 | |
VMware ESXi | =6.7-670-201810218 | |
VMware ESXi | =6.7-670-201810219 | |
VMware ESXi | =6.7-670-201810220 | |
VMware ESXi | =6.7-670-201810221 | |
VMware ESXi | =6.7-670-201810222 | |
VMware ESXi | =6.7-670-201810223 | |
VMware ESXi | =6.7-670-201810224 | |
VMware ESXi | =6.7-670-201810225 | |
VMware ESXi | =6.7-670-201810226 | |
VMware ESXi | =6.7-670-201810227 | |
VMware ESXi | =6.7-670-201810228 | |
VMware ESXi | =6.7-670-201810229 | |
VMware ESXi | =6.7-670-201810230 | |
VMware ESXi | =6.7-670-201810231 | |
VMware ESXi | =6.7-670-201810232 | |
VMware ESXi | =6.7-670-201810233 | |
VMware ESXi | =6.7-670-201810234 | |
VMware ESXi | =6.7-670-201811001 | |
VMware ESXi | =6.7-670-201901001 | |
VMware ESXi | =6.7-670-201901401 | |
VMware ESXi | =6.7-670-201901402 | |
VMware ESXi | =6.7-670-201901403 | |
VMware ESXi | =6.7-670-201903001 | |
VMware ESXi | =6.7-670-201904001 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2020-3971?
CVE-2020-3971 is classified as important due to its potential to allow local attackers to execute arbitrary code.
How do I fix CVE-2020-3971?
To fix CVE-2020-3971, upgrade to the patched versions of VMware ESXi 6.7, 6.5, Workstation 15.x, or Fusion 11.x.
What types of systems are affected by CVE-2020-3971?
CVE-2020-3971 affects VMware ESXi, VMware Workstation, and VMware Fusion versions prior to their respective patched releases.
Can CVE-2020-3971 be exploited remotely?
No, CVE-2020-3971 requires local access to the virtual machine for exploitation.
What is the impact of not addressing CVE-2020-3971?
Failing to address CVE-2020-3971 could allow a malicious user with access to the virtual machine to execute arbitrary code, potentially compromising the system.
- agent/softwarecombine
- agent/type
- collector/mitre-cve
- source/MITRE
- agent/author
- agent/references
- agent/last-modified-date
- agent/severity
- agent/weakness
- agent/description
- agent/first-publish-date
- agent/event
- agent/source
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/vmware
- canonical/vmware cloud foundation
- version/vmware cloud foundation/3.0
- canonical/vmware fusion pro
- version/vmware fusion pro/11.0.0
- canonical/vmware workstation
- version/vmware workstation/15.0.0
- canonical/vmware esxi
- version/vmware esxi/6.5
- version/vmware esxi/6.5-650-201701001
- version/vmware esxi/6.5-650-201703001
- version/vmware esxi/6.5-650-201703002
- version/vmware esxi/6.5-650-201704001
- version/vmware esxi/6.5-650-201707101
- version/vmware esxi/6.5-650-201707102
- version/vmware esxi/6.5-650-201707103
- version/vmware esxi/6.5-650-201707201
- version/vmware esxi/6.5-650-201707202
- version/vmware esxi/6.5-650-201707203
- version/vmware esxi/6.5-650-201707204
- version/vmware esxi/6.5-650-201707205
- version/vmware esxi/6.5-650-201707206
- version/vmware esxi/6.5-650-201707207
- version/vmware esxi/6.5-650-201707208
- version/vmware esxi/6.5-650-201707209
- version/vmware esxi/6.5-650-201707210
- version/vmware esxi/6.5-650-201707211
- version/vmware esxi/6.5-650-201707212
- version/vmware esxi/6.5-650-201707213
- version/vmware esxi/6.5-650-201707214
- version/vmware esxi/6.5-650-201707215
- version/vmware esxi/6.5-650-201707216
- version/vmware esxi/6.5-650-201707217
- version/vmware esxi/6.5-650-201707218
- version/vmware esxi/6.5-650-201707219
- version/vmware esxi/6.5-650-201707220
- version/vmware esxi/6.5-650-201707221
- version/vmware esxi/6.5-650-201710001
- version/vmware esxi/6.5-650-201712001
- version/vmware esxi/6.5-650-201803001
- version/vmware esxi/6.5-650-201806001
- version/vmware esxi/6.5-650-201808001
- version/vmware esxi/6.5-650-201810001
- version/vmware esxi/6.5-650-201810002
- version/vmware esxi/6.5-650-201811001
- version/vmware esxi/6.5-650-201811002
- version/vmware esxi/6.5-650-201811301
- version/vmware esxi/6.5-650-201901001
- version/vmware esxi/6.5-650-201903001
- version/vmware esxi/6.5-650-201905001
- version/vmware esxi/6.7
- version/vmware esxi/6.7-670-201806001
- version/vmware esxi/6.7-670-201807001
- version/vmware esxi/6.7-670-201808001
- version/vmware esxi/6.7-670-201810001
- version/vmware esxi/6.7-670-201810101
- version/vmware esxi/6.7-670-201810102
- version/vmware esxi/6.7-670-201810103
- version/vmware esxi/6.7-670-201810201
- version/vmware esxi/6.7-670-201810202
- version/vmware esxi/6.7-670-201810203
- version/vmware esxi/6.7-670-201810204
- version/vmware esxi/6.7-670-201810205
- version/vmware esxi/6.7-670-201810206
- version/vmware esxi/6.7-670-201810207
- version/vmware esxi/6.7-670-201810208
- version/vmware esxi/6.7-670-201810209
- version/vmware esxi/6.7-670-201810210
- version/vmware esxi/6.7-670-201810211
- version/vmware esxi/6.7-670-201810212
- version/vmware esxi/6.7-670-201810213
- version/vmware esxi/6.7-670-201810214
- version/vmware esxi/6.7-670-201810215
- version/vmware esxi/6.7-670-201810216
- version/vmware esxi/6.7-670-201810217
- version/vmware esxi/6.7-670-201810218
- version/vmware esxi/6.7-670-201810219
- version/vmware esxi/6.7-670-201810220
- version/vmware esxi/6.7-670-201810221
- version/vmware esxi/6.7-670-201810222
- version/vmware esxi/6.7-670-201810223
- version/vmware esxi/6.7-670-201810224
- version/vmware esxi/6.7-670-201810225
- version/vmware esxi/6.7-670-201810226
- version/vmware esxi/6.7-670-201810227
- version/vmware esxi/6.7-670-201810228
- version/vmware esxi/6.7-670-201810229
- version/vmware esxi/6.7-670-201810230
- version/vmware esxi/6.7-670-201810231
- version/vmware esxi/6.7-670-201810232
- version/vmware esxi/6.7-670-201810233
- version/vmware esxi/6.7-670-201810234
- version/vmware esxi/6.7-670-201811001
- version/vmware esxi/6.7-670-201901001
- version/vmware esxi/6.7-670-201901401
- version/vmware esxi/6.7-670-201901402
- version/vmware esxi/6.7-670-201901403
- version/vmware esxi/6.7-670-201903001
- version/vmware esxi/6.7-670-201904001
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203