Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-34048
Analyzed
More InfoOfficial Page
Source-security@vmware.com
View Known Exploited Vulnerability (KEV) details
Published At-25 Oct, 2023 | 18:17
Updated At-30 Oct, 2025 | 19:52

vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2024-01-222024-02-12VMware vCenter Server Out-of-Bounds Write VulnerabilityApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Date Added: 2024-01-22
Due Date: 2024-02-12
Vulnerability Name: VMware vCenter Server Out-of-Bounds Write Vulnerability
Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

VMware (Broadcom Inc.)
vmware
>>vcenter_server>>Versions from 4.0(inclusive) to 5.5(inclusive)
cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>7.0
cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>8.0
cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-787Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-787
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.vmware.com/security/advisories/VMSA-2023-0023.htmlsecurity@vmware.com
Vendor Advisory
https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-serveraf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2023-0023.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-34048134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2023-0023.html
Source: security@vmware.com
Resource:
Vendor Advisory
Hyperlink: https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2023-0023.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-34048
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource
Change History
0Changes found

Details not found