Description:
A vulnerability classified as critical was found in VMware ESXi (Virtualization Software). The vulnerability allows a remote attacker to bypass authentication process. The vulnerability exists due to an error in when processing authentication requests in SFCB (Small Footprint CIM Broker). A remote attacker can send specially crafted requests to port 5989/tcp, bypass SFCB authentication and gain unauthorized access to the system.
This vulnerability can be exploited by a remote non-authenticated attacker via the Internet. We are not aware of malware exploiting this vulnerability.
| Risk | High |
| Patch available | YES |
| Vector | [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C] |
| Exploitation vector | Network |
| Public exploit | N/A |
| Vulnerable software | Cloud Foundation Client/Desktop applications / Virtualization software |
| Vulnerable software versions | Cloud Foundation: 3.10, 3.10.1, 3.10.1.1, 3.10.1.2, 4.0, 4.0.1, 4.1, 4.2, 4.2.1 |
| 5.3-7.0 | |
| Vendor | VMware, Inc |
Mitigation
Install update from vendor’s website.