4.9
CVSSv2

CVE-2018-6982

Published: 04/12/2018 Updated: 03/02/2022
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.5 | Impact Score: 4 | Exploitability Score: 2
VMScore: 437
Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware workstation

vmware workstation 15.0.0

vmware fusion

vmware fusion 11.0.0

vmware esxi 6.0

vmware esxi 6.5

vmware esxi 6.7

Github Repositories

Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.

Limitation Script does not currently identify which ESXi systems have been patched, and merely relies on major and minor revision numbrer to determine if the hypervisor is vulnerable If required we can check patches but this tool will live and die over a short periord of time so it isn't worth the effort Description: This tool enables operations teams to quickly identif

Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.

Limitation Script does not currently identify which ESXi systems have been patched, and merely relies on major and minor revision numbrer to determine if the hypervisor is vulnerable If required we can check patches but this tool will live and die over a short periord of time so it isn't worth the effort Description: This tool enables operations teams to quickly identif

Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.

Limitation Script does not currently identify which ESXi systems have been patched, and merely relies on major and minor revision numbrer to determine if the hypervisor is vulnerable If required we can check patches but this tool will live and die over a short periord of time so it isn't worth the effort Description: This tool enables operations teams to quickly identif