This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of VMware ESXi. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SLP messages. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the SLP daemon.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-20-1377 is considered a critical vulnerability due to the potential for arbitrary code execution without authentication.
To address ZDI-20-1377, ensure your VMware ESXi installation is updated to the most recent security patch provided by VMware.
ZDI-20-1377 affects all installations of VMware ESXi that are running versions vulnerable to this specific flaw.
ZDI-20-1377 allows network-adjacent attackers to execute arbitrary code on the affected VMware ESXi systems.
No, authentication is not required to exploit the ZDI-20-1377 vulnerability, making it particularly dangerous.