VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vmware esxi 6.5 |
||
vmware esxi 6.7 |
||
vmware esxi 7.0 |
||
vmware cloud foundation 4.0.1 |
||
vmware cloud foundation 3.0.1 |
||
vmware cloud foundation 3.0.1.1 |
||
vmware cloud foundation 3.5 |
||
vmware cloud foundation 3.5.1 |
||
vmware cloud foundation 3.7 |
||
vmware cloud foundation 3.7.1 |
||
vmware cloud foundation 3.7.2 |
||
vmware cloud foundation 3.8 |
||
vmware cloud foundation 3.8.1 |
||
vmware cloud foundation 3.9 |
||
vmware cloud foundation 3.9.1 |
||
vmware cloud foundation 3.10 |
||
vmware cloud foundation 4.1 |
||
vmware cloud foundation 4.2.1 |
||
vmware cloud foundation 4.1.0.1 |
||
vmware cloud foundation 3.0 |
||
vmware cloud foundation 4.0 |
||
vmware cloud foundation 3.11 |
||
vmware cloud foundation 3.10.1 |
||
vmware cloud foundation 3.10.1.1 |
||
vmware cloud foundation 3.10.1.2 |
||
vmware cloud foundation 3.10.2.1 |
||
vmware cloud foundation 3.10.2.2 |
||
vmware cloud foundation 4.3.1 |
||
vmware cloud foundation 4.3 |
||
vmware cloud foundation 4.2 |
||
vmware cloud foundation 4.4.1 |
||
vmware cloud foundation 4.4.1.1 |
||
vmware cloud foundation 4.4 |
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Want a clue to what you’re dealing with? Check the ransom note
That didn't take long. A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes. The variant can't be decrypted using the script released to GitHub by CISA because, unlike earlier versions, it ...