It has been released that there is a use-after-free vulnerability in VMware vCenter Server in the implementation of the DCERPC protocol.
 
                            A malicious actor with network access to vCenter Server can exploit this vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server. (CVE-2023-20893)
Affected Systems
                                Configuration 1 
 
                                cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:* Up to (excluding) 7.0 
                                cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:* 
                                cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:* 
                            
IoC’s
-
Recommended Solution(s)
-
Mitigations
-
CVE / CWE
CVE-2023-20893
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.