Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CVE-2020-3952: Sensitive Information Disclosure in VMware vCenter Server (VMSA-2020-0006)



VMware patches a critical information disclosure flaw in vCenter Server with a CVSSv3 score of 10.0.

Contexte

On April 9, VMware published VMSA-2020-0006, a security advisory for a critical vulnerability in vCenter Server that received the maximum CVSSv3 score of 10.0.

Analyse

CVE-2020-3952 is a sensitive information disclosure flaw in VMware vCenter Server. The flaw resides in the VMware Directory Service (vmdir), which is included in vCenter Server as part of an embedded or external Platform Services Controller (PSC). Under “certain conditions,” vmdir does not implement proper access controls, which could allow a malicious attacker with network access to obtain sensitive information. While the advisory does not indicate what sensitive information could be obtained, VMware notes this information could be used to compromise vCenter Server or other services that use vmdir for authentication.

Démonstration de faisabilité (PoC)

At the time of this writing, no public PoC has been released for this vulnerability. Based on the CVSSv3 score of 10.0 assigned to this vulnerability, it is likely that it may be easy to exploit.

Solution

VMware released vCenter Server version 6.7u3f to address this vulnerability. The following table lists the affected versions of vCenter Server.

Produit Version Plateforme Affected Fixed Additional Documentation
vCenter Server 6.7 Appliance virtuelle Oui 6.7u3f KB78543
vCenter Server 6.7 Windows Oui 6.7u3f KB78543

According to VMware’s advisory, the vulnerability only affects specific versions of vCenter Server versions 6.7. Specifically, those instances where vCenter Server was upgraded from a previous version, including version 6.0 or 6.5. A new and clean installation of vCenter Server 6.7 is not affected.

VMware has published KB article 78543 with additional guidance to determine if a vCenter Server 6.7 deployment is affected.

Identification des systèmes affectés

A list of Tenable plugins to identify this vulnerability will appear here as they’re released.

Où trouver plus d'informations

Rejoignez l'équipe SRT de Tenable sur Tenable Community.

Apprenez-en plus sur Tenable, la première plateforme de Cyber Exposure qui vous permet de gérer votre surface d'attaque moderne de manière globale.

Profitez d'un essai gratuit de 30 jours de Tenable.io Vulnerability Management.


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.