8.8
CVSSv3

CVE-2022-31696

Published: 13/12/2022 Updated: 08/08/2023
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 0

Vulnerability Summary

VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware esxi 6.5

vmware esxi 6.7

vmware cloud foundation

vmware esxi 7.0

vmware cloud foundation 4.4.1

vmware cloud foundation 4.4.1.1

vmware cloud foundation 4.4

vmware cloud foundation 4.5

vmware cloud foundation 4.76

vmware cloud foundation 3.11

vmware cloud foundation 3.10

vmware cloud foundation 4.3.11

Vendor Advisories

Sign up for Security Advisories Stay up to date on the latest VMware Security advisories and updates ...

Recent Articles

ESXiArgs ransomware fights off Team America's data recovery script
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Want a clue to what you’re dealing with? Check the ransom note

That didn't take long. A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes. The variant can't be decrypted using the script released to GitHub by CISA because, unlike earlier versions, it ...