VMSA-2023-0014:VMware vCenter Server updates address multiple memory corruption vulnerabilities

VMware Tanzu Application Service

0 more products

23660

20 June 2023

20 June 2023

CLOSED

HIGH

5.9 - 8.1

CVE-2023-20892,CVE-2023-20893,CVE-2023-20894,CVE-2023-20895,CVE-2023-20896

VMSA-2023-0014
5.9 - 8.1
2023-06-22
2023-06-22 (Initial Advisory)
CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896
VMware vCenter Server updates address multiple memory corruption vulnerabilities (CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896)
1. Impacted Products
  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)
2. Introduction

Multiple memory corruption vulnerabilities in VMware vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

3a. VMware vCenter Server heap-overflow vulnerability (CVE-2023-20892)

Description:
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

Resolution:
To remediate CVE-2023-20892 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Aleksandar Nikolic of Cisco for reporting this issue to us.

Notes:
None.

3b. VMware vCenter Server use-after-free vulnerability (CVE-2023-20893)

Description:
The vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

Resolution:
To remediate CVE-2023-20893 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.

Notes:
None.

3c. VMware vCenter Server out-of-bounds write vulnerability (CVE-2023-20894)

Description:
The vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.

Resolution:
To remediate CVE-2023-20894 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.

Notes:
None.

3d. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20895)

Description:
The vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.

Resolution:
To remediate CVE-2023-20895 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.

Notes:
None.

3e. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20896)

Description:
The vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).

Resolution:
To remediate CVE-2023-20896 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos for reporting this issue to us.

Notes:
None.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
vCenter Server
8.0
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
None
vCenter Server
8.0
Any
CVE-2023-20896
None
None
vCenter Server
7.0
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
None
vCenter Server
7.0
Any
CVE-2023-20896
None
None
Cloud Foundation (vCenter Server)
5.x
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
Cloud Foundation (vCenter Server)
5.x
Any
CVE-2023-20896
None
Cloud Foundation (vCenter Server)
4.x
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
Cloud Foundation (vCenter Server)
4.x
Any
CVE-2023-20896
None
4. References
5. Change Log

2023-06-22 VMSA-2023-0014
Initial security advisory.

6. Contact

E-mail: [email protected]

PGP key at:
https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC

 

Copyright 2023 VMware Inc. All rights reserved.