8.8
CVSSv3

CVE-2018-6981

Published: 04/12/2018 Updated: 03/02/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware workstation 15.0.0

vmware workstation

vmware fusion 11.0.0

vmware fusion

vmware esxi 6.0

vmware esxi 6.5

vmware esxi 6.7

Github Repositories

Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.

Limitation Script does not currently identify which ESXi systems have been patched, and merely relies on major and minor revision numbrer to determine if the hypervisor is vulnerable If required we can check patches but this tool will live and die over a short periord of time so it isn't worth the effort Description: This tool enables operations teams to quickly identif

Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.

Limitation Script does not currently identify which ESXi systems have been patched, and merely relies on major and minor revision numbrer to determine if the hypervisor is vulnerable If required we can check patches but this tool will live and die over a short periord of time so it isn't worth the effort Description: This tool enables operations teams to quickly identif

Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.

Limitation Script does not currently identify which ESXi systems have been patched, and merely relies on major and minor revision numbrer to determine if the hypervisor is vulnerable If required we can check patches but this tool will live and die over a short periord of time so it isn't worth the effort Description: This tool enables operations teams to quickly identif