CVE-2020-3952
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- December 30, 2019
- Published Date
- April 10, 2020
- Last Updated
- January 29, 2025
- Vendor
- n/a
- Product
- VMware vCenter Server
- Description
- Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
CVSS Scores
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
gelim/CVE-2020-3952
Type: github • Created: 2020-04-17 12:39:31 UTC • Stars: 1
VMWare vmdir missing access control exploit checker
bb33bb/CVE-2020-3952
Type: github • Created: 2020-04-16 01:39:33 UTC • Stars: 6
Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell
chronoloper/CVE-2020-3952
Type: github • Created: 2020-04-15 00:51:21 UTC • Stars: 4
Vuln Check