Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-21991

Summary
Assigner-vmware
Assigner Org ID-dcf2e128-44bd-42ed-91e8-88f912c1401d
Published At-22 Sep, 2021 | 18:59
Updated At-03 Aug, 2024 | 18:30
Rejected At-
Credits

The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:vmware
Assigner Org ID:dcf2e128-44bd-42ed-91e8-88f912c1401d
Published At:22 Sep, 2021 | 18:59
Updated At:03 Aug, 2024 | 18:30
Rejected At:
▼CVE Numbering Authority (CNA)

The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).

Affected Products
Vendor
n/a
Product
VMware vCenter Server, VMware Cloud Foundation
Versions
Affected
  • VMware vCenter Server(7.x before 7.0 U2c, 6.7 before 6.7 U3o and 6.5 before 6.5 U3q) and VMware Cloud Foundation (4.x before 4.3 and 3.x before 3.10.2.2)
Problem Types
TypeCWE IDDescription
textN/ALocal privilege escalation vulnerability
Type: text
CWE ID: N/A
Description: Local privilege escalation vulnerability
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.vmware.com/security/advisories/VMSA-2021-0020.html
x_refsource_MISC
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2021-0020.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.vmware.com/security/advisories/VMSA-2021-0020.html
x_refsource_MISC
x_transferred
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2021-0020.html
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@vmware.com
Published At:22 Sep, 2021 | 19:15
Updated At:12 Jul, 2022 | 17:42

The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

VMware (Broadcom Inc.)
vmware
>>cloud_foundation>>Versions from 3.0(inclusive) to 3.10.2.2(exclusive)
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>cloud_foundation>>Versions from 4.0(inclusive) to 4.3(exclusive)
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.5
cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update3n:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.vmware.com/security/advisories/VMSA-2021-0020.htmlsecurity@vmware.com
Patch
Vendor Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2021-0020.html
Source: security@vmware.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

79Records found

CVE-2022-34670
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.74%
||
7 Day CHG~0.00%
Published-30 Dec, 2022 | 00:00
Updated-11 Apr, 2025 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure.

Action-Not Available
Vendor-Red Hat, Inc.Citrix (Cloud Software Group, Inc.)Debian GNU/LinuxVMware (Broadcom Inc.)Linux Kernel Organization, IncNVIDIA Corporation
Product-debian_linuxlinux_kernelgpu_display_driverenterprise_linux_kernel-based_virtual_machinevirtual_gpuhypervisornvsteslavspherequadrocloud_gaminggeforcertxvGPU software (guest driver) - Linux, vGPU software (Virtual GPU Manager), NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)
CWE ID-CWE-197
Numeric Truncation Error
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2022-34676
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.1||HIGH
EPSS-0.06% / 17.39%
||
7 Day CHG~0.00%
Published-30 Dec, 2022 | 00:00
Updated-11 Apr, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering.

Action-Not Available
Vendor-Red Hat, Inc.Citrix (Cloud Software Group, Inc.)VMware (Broadcom Inc.)Linux Kernel Organization, IncNVIDIA Corporation
Product-linux_kernelenterprise_linux_kernel-based_virtual_machinevirtual_gpuhypervisorvspherecloud_gamingvGPU software (guest driver) - Linux, vGPU software (Virtual GPU Manager), NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)
CWE ID-CWE-197
Numeric Truncation Error
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-31660
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-11.15% / 93.20%
||
7 Day CHG+1.36%
Published-05 Aug, 2022 | 15:05
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncVMware (Broadcom Inc.)Microsoft Corporation
Product-access_connectorlinux_kernelidentity_manager_connectorone_accesswindowsidentity_managerVMware Workspace ONE Access, Identity Manager and vRealize Automation
CVE-2022-31676
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.27%
||
7 Day CHG~0.00%
Published-23 Aug, 2022 | 00:00
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.

Action-Not Available
Vendor-n/aFedora ProjectVMware (Broadcom Inc.)Microsoft CorporationLinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-debian_linuxlinux_kernelontap_select_deploy_administration_utilityfedoratoolswindowsVMware Tools
CWE ID-CWE-269
Improper Privilege Management
CVE-2005-0444
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.05% / 14.21%
||
7 Day CHG~0.00%
Published-15 Feb, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware before 4.5.2.8848-r5 searches for gdk-pixbuf shared libraries using a path that includes the rrdharan world-writable temporary directory, which allows local users to execute arbitrary code.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstationn/a
CVE-2024-0091
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.52%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 21:23
Updated-15 Aug, 2024 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.

Action-Not Available
Vendor-Citrix (Cloud Software Group, Inc.)Microsoft CorporationCanonical Ltd.Red Hat, Inc.VMware (Broadcom Inc.)NVIDIA CorporationLinux Kernel Organization, Inc
Product-ubuntu_linuxstudiovirtual_gpuhypervisorteslavspherequadrocloud_gaminggeforcertxlinux_kernelgpu_display_driverazure_stack_hcienterprise_linux_kernel-based_virtual_machinenvswindowsGPU display driver, vGPU software, and Cloud Gamingstudioquadro_firmwarenvs_firmwareteslageforcertx
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2022-31664
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.23% / 45.96%
||
7 Day CHG+0.03%
Published-05 Aug, 2022 | 15:06
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncVMware (Broadcom Inc.)Microsoft Corporation
Product-access_connectorlinux_kernelidentity_manager_connectorone_accesswindowsidentity_managerVMware Workspace ONE Access, Identity Manager and vRealize Automation
CVE-2003-0739
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 21.25%
||
7 Day CHG~0.00%
Published-04 Sep, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Workstation 4.0.1 for Linux, build 5289 and earlier, allows local users to delete arbitrary files via a symlink attack.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstationn/a
CVE-2020-10713
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.2||HIGH
EPSS-0.26% / 49.02%
||
7 Day CHG-0.11%
Published-30 Jul, 2020 | 12:58
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Debian GNU/LinuxGNUopenSUSE
Product-grub2photon_osdebian_linuxleapGrub
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-22962
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.30%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:38
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Horizon Agent for Linux (prior to 22.x) contains a local privilege escalation as a user is able to change the default shared folder location due to a vulnerable symbolic link. Successful exploitation can result in linking to a root owned file.

Action-Not Available
Vendor-Linux Kernel Organization, IncVMware (Broadcom Inc.)
Product-horizonlinux_kernelVMware Horizon Agent for Linux
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2022-22945
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:38
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware NSX Edge contains a CLI shell injection vulnerability. A malicious actor with SSH access to an NSX-Edge appliance can execute arbitrary commands on the operating system as root.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-nsx_data_centercloud_foundationVMware NSX Edge
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-27772
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.07% / 76.87%
||
7 Day CHG~0.00%
Published-30 Mar, 2022 | 17:45
Updated-03 Aug, 2024 | 05:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-spring_bootn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-22960
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-74.63% / 98.81%
||
7 Day CHG~0.00%
Published-13 Apr, 2022 | 00:00
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-06||Apply updates per vendor instructions.

VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncVMware (Broadcom Inc.)
Product-linux_kernelcloud_foundationworkspace_one_accessidentity_managervrealize_suite_lifecycle_managervrealize_automationVMware Workspace ONE Access, Identity Manager and vRealize AutomationMultiple Products
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-22041
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-6.7||MEDIUM
EPSS-1.06% / 76.76%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstationcloud_foundationesxifusionVMware ESXi , Workstation, Fusion and VMware Cloud Foundation
CVE-2021-22015
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-2.27% / 83.97%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 00:00
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_servercloud_foundationVMware vCenter Server, VMware Cloud Foundation
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2021-1084
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.62%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 18:50
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).

Action-Not Available
Vendor-Red Hat, Inc.Citrix (Cloud Software Group, Inc.)VMware (Broadcom Inc.)Microsoft CorporationNVIDIA CorporationLinux Kernel Organization, Inc
Product-linux_kernelenterprise_linux_kernel-based_virtual_machinehypervisorwindowsvirtual_gpu_managervsphereNVIDIA Virtual GPU Software
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1081
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.55%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 18:50
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior 8.7).

Action-Not Available
Vendor-nutanixRed Hat, Inc.Citrix (Cloud Software Group, Inc.)VMware (Broadcom Inc.)Microsoft CorporationNVIDIA CorporationLinux Kernel Organization, Inc
Product-linux_kernelenterprise_linux_kernel-based_virtual_machinehypervisorwindowsvirtual_gpu_managervsphereahvNVIDIA Virtual GPU Software
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2022-22973
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-3.39% / 86.91%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 20:18
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Workspace ONE Access and Identity Manager contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncVMware (Broadcom Inc.)
Product-linux_kernelidentity_managerworkspace_one_accessvrealize_suite_lifecycle_managercloud_foundationVMware Workspace ONE Access and Identity Manager.
CVE-2022-31661
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.70%
||
7 Day CHG+0.02%
Published-05 Aug, 2022 | 15:06
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two privilege escalation vulnerabilities. A malicious actor with local access can escalate privileges to 'root'.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncVMware (Broadcom Inc.)Microsoft Corporation
Product-access_connectorlinux_kernelidentity_manager_connectorone_accesswindowsidentity_managerVMware Workspace ONE Access, Identity Manager and vRealize Automation
CVE-2022-22964
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.50%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:38
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Horizon Agent for Linux (prior to 22.x) contains a local privilege escalation that allows a user to escalate to root due to a vulnerable configuration file.

Action-Not Available
Vendor-Linux Kernel Organization, IncVMware (Broadcom Inc.)
Product-horizonlinux_kernelVMware Horizon Agent for Linux
CVE-2022-22942
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-14.03% / 94.08%
||
7 Day CHG~0.00%
Published-13 Dec, 2023 | 08:16
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-photon_osPhoton OS
CWE ID-CWE-416
Use After Free
CVE-2020-3974
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.20%
||
7 Day CHG~0.00%
Published-10 Jul, 2020 | 13:14
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed.

Action-Not Available
Vendor-n/aApple Inc.VMware (Broadcom Inc.)
Product-remote_consolefusionmacoshorizon_clientVMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac
CVE-2020-3961
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.04% / 8.87%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 15:18
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Horizon Client for Windows (prior to 5.4.3) contains a privilege escalation vulnerability due to folder permission configuration and unsafe loading of libraries. A local user on the system where the software is installed may exploit this issue to run commands as any user.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Microsoft Corporation
Product-windowshorizon_clientVMware Horizon Client for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2023-34057
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.32%
||
7 Day CHG~0.00%
Published-27 Oct, 2023 | 04:52
Updated-06 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Apple Inc.
Product-macostoolsVMware Tools
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-22118
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.25% / 48.39%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 14:48
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)NetApp, Inc.Oracle Corporation
Product-healthcare_data_repositorycommunications_network_integritycommunications_session_route_managerretail_assortment_planningcommunications_session_report_managerretail_merchandising_systemcommunications_cloud_native_core_policycommunications_brm_-_elastic_charging_enginecommunications_cloud_native_core_unified_data_repositoryretail_order_brokerfinancial_services_analytical_applications_infrastructurecommunications_cloud_native_core_binding_support_functioncommunications_interactive_session_recordercommunications_unified_inventory_managementdocumakerretail_customer_management_and_segmentation_foundationretail_predictive_application_servercommunications_cloud_native_core_service_communication_proxyinsurance_rules_paletteutilities_testing_acceleratorcommunications_cloud_native_core_security_edge_protection_proxyretail_financial_integrationhciretail_integration_busenterprise_data_qualitymanagement_services_for_element_softwarespring_frameworkcommunications_diameter_intelligence_hubmysql_enterprise_monitorinsurance_policy_administrationcommunications_element_managercommerce_guided_searchSpring Framework
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-22040
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-6.7||MEDIUM
EPSS-1.15% / 77.64%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstation_playerfusionworkstation_proesxicloud_foundationVMware ESXi , Workstation, Fusion and VMware Cloud Foundation
CWE ID-CWE-416
Use After Free
CVE-2021-1059
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.62%
||
7 Day CHG~0.00%
Published-08 Jan, 2021 | 15:05
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input index is not validated, which may lead to integer overflow, which in turn may cause tampering of data, information disclosure, or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).

Action-Not Available
Vendor-nutanixVMware (Broadcom Inc.)NVIDIA CorporationCitrix (Cloud Software Group, Inc.)Red Hat, Inc.
Product-enterprise_linux_kernel-based_virtual_machinehypervisorvirtual_gpu_managervsphereahvNVIDIA Virtual GPU Manager
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-1083
Matching Score-8
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-8
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.62%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 18:50
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).

Action-Not Available
Vendor-Red Hat, Inc.Citrix (Cloud Software Group, Inc.)VMware (Broadcom Inc.)Microsoft CorporationNVIDIA CorporationLinux Kernel Organization, Inc
Product-linux_kernelenterprise_linux_kernel-based_virtual_machinehypervisorwindowsvirtual_gpu_managervsphereNVIDIA Virtual GPU Software
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2020-3968
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-8.2||HIGH
EPSS-0.10% / 27.56%
||
7 Day CHG~0.00%
Published-25 Jun, 2020 | 14:43
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-workstationcloud_foundationesxifusionFusionVMware ESXiWorkstation
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • Next
Details not found