First published: Thu Jun 22 2023(Updated: )
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter Server | <7.0 | |
VMware vCenter Server | =7.0 | |
VMware vCenter Server | =7.0-a | |
VMware vCenter Server | =7.0-b | |
VMware vCenter Server | =7.0-c | |
VMware vCenter Server | =7.0-d | |
VMware vCenter Server | =7.0-update1 | |
VMware vCenter Server | =7.0-update1a | |
VMware vCenter Server | =7.0-update1c | |
VMware vCenter Server | =7.0-update1d | |
VMware vCenter Server | =7.0-update2 | |
VMware vCenter Server | =7.0-update2a | |
VMware vCenter Server | =7.0-update2b | |
VMware vCenter Server | =7.0-update2c | |
VMware vCenter Server | =7.0-update2d | |
VMware vCenter Server | =7.0-update3 | |
VMware vCenter Server | =7.0-update3a | |
VMware vCenter Server | =7.0-update3c | |
VMware vCenter Server | =7.0-update3d | |
VMware vCenter Server | =7.0-update3e | |
VMware vCenter Server | =7.0-update3f | |
VMware vCenter Server | =7.0-update3g | |
VMware vCenter Server | =7.0-update3h | |
VMware vCenter Server | =7.0-update3i | |
VMware vCenter Server | =7.0-update3j | |
VMware vCenter Server | =7.0-update3k | |
VMware vCenter Server | =7.0-update3l | |
VMware vCenter Server | =8.0 | |
VMware vCenter Server | =8.0-a | |
VMware vCenter Server | =8.0-b | |
VMware vCenter Server | =8.0-c | |
VMware vCenter Server | =8.0-update1 | |
VMware vCenter Server | =8.0-update1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20893 is critical.
The affected software for CVE-2023-20893 is VMware vCenter Server versions up to and including 7.0.
A malicious actor with network access to vCenter Server can exploit CVE-2023-20893 to execute arbitrary code on the underlying operating system.
Yes, VMware has released security advisories with patches to address CVE-2023-20893. It is recommended to update to the latest version of VMware vCenter Server.
You can find more information about CVE-2023-20893 in the vulnerability reports by Talos Intelligence and the security advisories by VMware.