VMSA-2023-0014:VMware vCenter Server updates address multiple memory corruption vulnerabilities
23660
20 June 2023
20 June 2023
CLOSED
HIGH
5.9 - 8.1
CVE-2023-20892,CVE-2023-20893,CVE-2023-20894,CVE-2023-20895,CVE-2023-20896
1. Impacted Products
- VMware vCenter Server (vCenter Server)
- VMware Cloud Foundation (Cloud Foundation)
2. Introduction
Multiple memory corruption vulnerabilities in VMware vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.
3a. VMware vCenter Server heap-overflow vulnerability (CVE-2023-20892)
Description:
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Resolution:
To remediate CVE-2023-20892 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
Acknowledgments:
VMware would like to thank Aleksandar Nikolic of Cisco for reporting this issue to us.
Notes:
None.
3b. VMware vCenter Server use-after-free vulnerability (CVE-2023-20893)
Description:
The vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Resolution:
To remediate CVE-2023-20893 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.
Notes:
None.
3c. VMware vCenter Server out-of-bounds write vulnerability (CVE-2023-20894)
Description:
The vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
Resolution:
To remediate CVE-2023-20894 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.
Notes:
None.
3d. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20895)
Description:
The vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1
Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
Resolution:
To remediate CVE-2023-20895 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.
Notes:
None.
3e. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20896)
Description:
The vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).
Resolution:
To remediate CVE-2023-20896 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
Acknowledgments:
VMware would like to thank Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos for reporting this issue to us.
Notes:
None.
Response Matrix
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
vCenter Server | 8.0 | Any | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | None | None | |||
vCenter Server | 8.0 | Any | CVE-2023-20896 | None | None | |||
vCenter Server | 7.0 | Any | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | None | None | |||
vCenter Server | 7.0 | Any | CVE-2023-20896 | None | None | |||
Cloud Foundation (vCenter Server) | 5.x | Any | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | None | ||||
Cloud Foundation (vCenter Server) | 5.x | Any | CVE-2023-20896 | None | ||||
Cloud Foundation (vCenter Server) | 4.x | Any | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | None | ||||
Cloud Foundation (vCenter Server) | 4.x | Any | CVE-2023-20896 | None |
4. References
Fixed Version(s) and Release Notes:
VMware vCenter Server 8.0 U1b
Downloads and Documentation:
https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-vcenter-server-80u1b-release-notes/index.html
VMware vCenter Server 7.0 U3m
Downloads and Documentation:
https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3m-release-notes/index.html
KB Articles:
Cloud Foundation 4.x/5.x:
https://kb.vmware.com/s/article/88287
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20896
FIRST CVSSv3 Calculator:
CVE-2023-20892: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-20893: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-20894: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-20895: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-20896: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
5. Change Log
2023-06-22 VMSA-2023-0014
Initial security advisory.
6. Contact
E-mail: [email protected]
PGP key at:
https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2023 VMware Inc. All rights reserved.