First published: Tue Oct 20 2020(Updated: )
VMware NSX-T (3.x before 3.0.2, 2.5.x before 2.5.2.2.0) contains a security vulnerability that exists in the way it allows a KVM host to download and install packages from NSX manager. A malicious actor with MITM positioning may be able to exploit this issue to compromise the transport node.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<3.10.1.1 | |
VMware Cloud Foundation | >=4.0<4.1 | |
Vmware Nsx-t Data Center | >=2.5.0<2.5.2.2.0 | |
Vmware Nsx-t Data Center | >=3.0.0<3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3993 is a security vulnerability in VMware NSX-T that allows a malicious actor with MITM positioning to compromise the transport node.
CVE-2020-3993 affects VMware NSX-T by allowing a KVM host to download and install packages from NSX manager, which can be exploited by an attacker with MITM positioning.
CVE-2020-3993 has a severity rating of medium (5.9).
VMware NSX-T versions 3.x before 3.0.2 and 2.5.x before 2.5.2.2.0 are affected by CVE-2020-3993.
You can find more information about CVE-2020-3993 on the VMware security advisories page: https://www.vmware.com/security/advisories/VMSA-2020-0023.html