Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3992

KEV · Ransomware EPSS 90.87% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-3992

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
VMware ESXi 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMware ESXi是美国威睿(VMware)公司的一套可直接安装在物理服务器上的服务器虚拟化平台。 VMware ESXi 存在安全漏洞,该漏洞源于攻击者可以访问ESXi机器上的427端口,从而利用该漏洞导致远程代码执行。以下产品及版本受到影响: ESXi_7.0.1-0.0.16850804 7.0之前版本, ESXi670-202010401-SG 6.7之前版本, ESXi650-202010401-SG 6.5 之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-VMware ESXi VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) -

II. Public POCs for CVE-2020-3992

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-3992

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-10-20 · 17 CVEs total

CVE-2020-77497.6 HIGHServer-side Request Forgery (SSRF)
CVE-2020-77476.3 MEDIUMCross-site Scripting (XSS)
CVE-2020-77485.6 MEDIUMPrototype Pollution
CVE-2020-25157Advantech R-SeeNet SQL注入漏洞
CVE-2020-5791Nagios XI和Nagios 操作系统命令注入漏洞
CVE-2020-5790Nagios XI 跨站请求伪造漏洞
CVE-2020-5792Nagios XI 参数注入漏洞
CVE-2020-15931Netwrix Account Lockout Examiner 安全漏洞
CVE-2020-24765Mind iMind Server 信息泄露漏洞
CVE-2019-9080DomainMod 加密问题漏洞
CVE-2020-3995VMware ESXi 安全漏洞
CVE-2020-3994VMware vCenter Server 信任管理问题漏洞
CVE-2020-3993VMware NSX-T 安全漏洞
CVE-2020-3982VMware ESXi 安全漏洞
CVE-2020-3981VMware ESXi 安全漏洞
CVE-2020-25648NSS 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-3992

No comments yet


Leave a comment