VMWare issued a warning and patch for a vulnerability in its VMware vCenter Server that maxed out the CVSS rating system by garnering a 10.0.
The issue, CVE-2020-3952, centers on the vmdir that ships with VMWare vCenter Server as it does not properly implement access controls. To exploit this vulnerability a malicious actor would have to have network access to an affected vmdir deployment giving them the ability to extract highly sensitive information which then could be used to compromise vCenter Server or other services which are dependent upon vmdir for authentication.
Satnam Narang, principal research engineer at Tenable, pointed out that VMWare listed only a limited set of vCenter Servers affected by this flaw, specifically version 6.7 upgraded from version 6.0 and 6.5. Narang also suggested that by giving the flaw a 10.0 CVSS score VMWare likely believes it is easy to exploit.
“Though the vulnerability was reported privately, suggesting details won’t become publicly available in the near term, it does not preclude individuals from piecing together information from the advisory and knowledgebase to figure out a way to exploit the flaw,” he said.
The company recommends checking this advisory to find out if a vmdir deployment is affected by CVE-2020-3952.
The update containing the patch can be found here.