NA

CVE-2022-31698

Published: 13/12/2022 Updated: 07/11/2023
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The vCenter Server contains a denial-of-service vulnerability in the content library service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to trigger a denial-of-service condition by sending a specially crafted header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware vcenter server 6.5

vmware vcenter server 6.7

vmware vcenter server 7.0

vmware cloud foundation 4.0

vmware cloud foundation 4.0.1

vmware cloud foundation 3.0

vmware cloud foundation 3.0.1

vmware cloud foundation 3.0.1.1

vmware cloud foundation 3.5

vmware cloud foundation 3.5.1

vmware cloud foundation 3.7

vmware cloud foundation 3.7.1

vmware cloud foundation 3.7.2

vmware cloud foundation 3.8

vmware cloud foundation 3.8.1

vmware cloud foundation 3.9

vmware cloud foundation 3.9.1

vmware cloud foundation 3.10

vmware cloud foundation 4.1

vmware cloud foundation 4.2.1

vmware cloud foundation 4.1.0.1

vmware cloud foundation 3.11

vmware cloud foundation 3.10.1

vmware cloud foundation 3.10.1.1

vmware cloud foundation 3.10.1.2

vmware cloud foundation 3.10.2.1

vmware cloud foundation 3.10.2.2

vmware cloud foundation 4.3.1

vmware cloud foundation 4.3

vmware cloud foundation 4.2

vmware cloud foundation 4.4.1

vmware cloud foundation 4.4.1.1

vmware cloud foundation 4.4

vmware cloud foundation 3.10.2

Vendor Advisories

Sign up for Security Advisories Stay up to date on the latest VMware Security advisories and updates ...

Recent Articles

ESXiArgs ransomware fights off Team America's data recovery script
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Want a clue to what you’re dealing with? Check the ransom note

That didn't take long. A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes. The variant can't be decrypted using the script released to GitHub by CISA because, unlike earlier versions, it ...