6.8
CVSSv2

CVE-2020-3952

Published: 10/04/2020 Updated: 12/07/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 607
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware vcenter server 6.7

Exploits

VMware vCenter Server version 67 authentication bypass exploit ...

Github Repositories

Get-vSphereVersion Getting started Get-vSphereVersion is a simple way of verifying the current version of a VMWare vCenter Server Usage PS C:\> iex (new-object netwebclient)downloadstring("rawgithubusercontentcom/vikerup/Get-vSphereVersion/main/Get-vSphereVersionps1") PS C:\> Get-vSphereVersion -servername 192168010 name : VM

Exploit for CVE-2020-3952 in vCenter 6.7

Proof of concept for CVE-2020-3952 This is a short piece of code that exploits of CVE-2020-3952, which is described in detail at the Guardicore Labs post over here This vulnerability was published by VMware in April 2020 with a maximum CVSS score of 100 It allows an attacker with a network connection to take control of the vCenter Directory (and thus to the vSphere deploymen

Get-vSphereVersion Getting started Get-vSphereVersion is a simple way of verifying the current version of a VMWare vCenter Server Usage PS C:\> iex (new-object netwebclient)downloadstring("rawgithubusercontentcom/vikerup/Get-vSphereVersion/main/Get-vSphereVersionps1") PS C:\> Get-vSphereVersion -servername 192168010 name : VM

Exploit for CVE-2020-3952 in vCenter 6.7 https://www.guardicore.com/2020/04/pwning-vmware-vcenter-cve-2020-3952/

Proof of concept for CVE-2020-3952 This is a short piece of code that exploits of CVE-2020-3952, which is described in detail at the Guardicore Labs post over here This vulnerability was published by VMware in April 2020 with a maximum CVSS score of 100 It allows an attacker with a network connection to take control of the vCenter Directory (and thus to the vSphere deploymen

VMWare vmdir missing access control exploit checker

Script to check for vulnerable status of CVE-2020-3952 It is inspired from guardicore exploit but with a slight difference: it does NOT create an admin user It will assess the vulnerable status by validating that the builtin Administrators group can be tainted by creating or appending the harmless 'description' attribute Check Usage: $ python exploit_checkpy vserve

Recent Articles

That critical VMware vuln allowed anyone on your network to create new admin users, no creds needed
The Register • Gareth Corfield • 17 Apr 2020

Reason behind murky CVSS 10 score revealed by Guardicore

A critical vulnerability in VMware's vCenter management product allowed any old bod on the same network to remotely create an admin-level user, research by Guardicore Labs has revealed. The astonishing vuln (CVE-2020-3952), details of which were quite spare when VMWare issued a patch last week, was rated by VMware itself as CVSS v3 10.0, the highest level. Admins in charge of VMware estates should probably patch this one immediately, if they haven't already. Guardicore researcher JJ Lehman told ...

How to make a stranger's insecure 3D printer halt-and-catch-fire – plus more alerts from infosec world
The Register • Shaun Nichols in San Francisco • 13 Apr 2020

San Francisco Airport websites hacked, VMware patches emitted, etc

Roundup We're one week further along, and we hope everyone is well out there. Time for another security roundup amid the coronavirus lockdown. In what was surely a very serious piece of research and not just an excuse to set stuff ablaze, the team at the aptly-named CoalFire have demonstrated how a 3D printer could be tricked into bursting into flames remotely. By hijacking the firmware update process of a 3D printer called the Flashforge Finder, a miscreant could potentially flash the machine's...