Headline
CVE-2023-20895: VMSA-2023-0014
The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
**Description:
**The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
**Known Attack Vectors:
**A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
**Resolution:
**To remediate CVE-2023-20892 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.
**Workarounds:
**None.
**Additional Documentation:
**Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
**Acknowledgments:
**VMware would like to thank Aleksandar Nikolic of Cisco for reporting this issue to us.
**Notes:
**None.
**3b. VMware vCenter Server use-after-free vulnerability (CVE-2023-20893)
**
**Description:
**The vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
**Known Attack Vectors:
**A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
**Resolution:
**To remediate CVE-2023-20893 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.
**Workarounds:
**None.
**Additional Documentation:
**Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
**Acknowledgments:
**VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.
**Notes:
**None.
**3c. VMware vCenter Server out-of-bounds write vulnerability (CVE-2023-20894)
**
**Description:
**The vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
**Known Attack Vectors:
**A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
**Resolution:
**To remediate CVE-2023-20894 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.
**Workarounds:
**None.
**Additional Documentation:
**Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
**Acknowledgments:
**VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.
**Notes:
**None.
**3d. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20895)
**
**Description:
**The vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1
**Known Attack Vectors:
**A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
**Resolution:
**To remediate CVE-2023-20895 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.
**Workarounds:
**None.
**Additional Documentation:
**Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
**Acknowledgments:
**VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.
**Notes:
**None.
**3e. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20896)
**
**Description:
**The vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.
**Known Attack Vectors:
**A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).
**Resolution:
**To remediate CVE-2023-20896 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.
**Workarounds:
**None.
**Additional Documentation:
**Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.
**Acknowledgments:
**VMware would like to thank Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos for reporting this issue to us.
**Notes:
**None.
Related news
Uncovered issues fall into use-after-free, buffer-overflow, information leak and denial of service vulnerability classes. Some of these could be combined to achieve remote code execution or privilege escalation.