Update to VMware Security-Advisory VMSA-2020-0023.1 | Critical, Important CSSv3 5.9-9.8 OpenSLP | New ESXi Patches Released
VMware Security team released this updated information, follow up with VMware if you have questions.
Important Update Notes
The ESXi patches released on October 20, 2020 did not address CVE-2020-3992 completely. The ESXi patches listed in the Response Matrix in section 3a have been updated to contain the complete fix for CVE-2020-3992.
In Reference to OpenSLP vulnerability in Section 3a
VMware ESXi 7.0 ESXi70U1a-17119627 (Updated)
VMware ESXi 6.7 ESXi670-202011301-SG (Updated)
Download
Documentation
Note; VMware Cloud Foundation ESXi 3.x & 4.x are still pending at this time.
VMware ESXi
- VMware vCenter
- VMware Workstation Pro / Player (Workstation)
- VMware Fusion Pro / Fusion (Fusion)
- NSX-T
- VMware Cloud Foundation
VMSA-2020-0023.1 | Severity: Critical | ||
CVSSv3 Range | 5.9-9.8 | ||
Issue date: | 10/20/2020 and updated 11/04/2020 | ||
Synopsis: | VMware ESXi, vCenter, Workstation, Fusion and NSX-T updates address multiple security vulnerabilities | ||
CVE numbers: | CVE-2020-3981 CVE-2020-3982 CVE-2020-3992 CVE-2020-3993 CVE-2020-3994 CVE-2020-3995 |
1. Impacted Products | ||||||||||||||||
|
||||||||||||||||
2. Introduction | ||||||||||||||||
Multiple vulnerabilities in VMware ESXi, Workstation, Fusion and NSX-T were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products. | ||||||||||||||||
3a. ESXi OpenSLP remote code execution vulnerability (CVE-2020-3992) | Critical | |||||||||||||||
IMPORTANT: The ESXi patches released on October 20, 2020 did not address CVE-2020-3992 completely, see section (3a) Notes for an update.
Description: Known Attack Vectors A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution. Resolution To remediate CVE-2020-3992 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below. Workarounds Workarounds for CVE-2020-3992 have been listed in the ‘Workarounds’ column of the ‘Response Matrix’ below. Notes The ESXi patches released on October 20, 2020 did not address CVE-2020-3992 completely. The ESXi patches listed in the Response Matrix below are updated versions that contain the complete fix for CVE-2020-3992. |
||||||||||||||||
Response Matrix | Critical | |||||||||||||||
Product | Version | Running On | CVE Identifier | CVSSv3 | Fixed Version | Workarounds | ||||||||||
ESXi | 7.0 | Any | CVE-2020-3992 | 9.8 | ESXi70U1a-17119627 Updated | KB76372 | ||||||||||
ESXi | 6.7 | Any | CVE-2020-3992 | 9.8 | ESXi670-202011301-SG Updated | KB76372 | ||||||||||
ESXi | 6.5 | Any | CVE-2020-3992 | 9.8 | ESXi650-202011401-SG | KB76372 | ||||||||||
Cloud Foundation (ESXi) | 4.x | Any | CVE-2020-3992 | 9.8 | Patch Pending | KB76372 | ||||||||||
Cloud Foundation (ESXi) | 3.x | Any | CVE-2020-3992 | 9.8 | Patch Pending | KB76372 | ||||||||||
Only section 3a has been updated at this time; The rest of the VMSA is the same; only the links to the new ESX 7U1a and 6.7 updates have been included below this line. | ||||||||||||||||
3b. NSX-T Man-in-the-Middle vulnerability MITM (CVE-2020-3993) | Important | |||||||||||||||
Description: VMware NSX-T contains a security vulnerability that exists in the way it allows a KVM host to download and install packages from NSX manager. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5.Known Attack Vectors A malicious actor with MITM positioning may be able to exploit this issue to compromise the transport node.Resolution To remediate CVE-2020-3993 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below. Workarounds: None |
||||||||||||||||
Response Matrix | Important | |||||||||||||||
Product | Version | Running On | CVE Identifier | CVSSv3 | Fixed Version | Workarounds | ||||||||||
NSX-T | 3.x | Any | CVE-2020-3993 | 7.5 | 3.0.2 | None | ||||||||||
NSX-T | 2.5.x | Any | CVE-2020-3993 | 7.5 | 2.5.2.2.0 | None | ||||||||||
Cloud Foundation (NSX-T) | 4.x | Any | CVE-2020-3993 | 7.5 | 4.1 | None | ||||||||||
Cloud Foundation (NSX-T) | 3.x | Any | CVE-2020-3993 | 7.5 | 3.10.1.1 | None | ||||||||||
3c. Time-of-check to time-of-use TOCTOU out-of-bounds read vulnerability (CVE-2020-3981) | Important | |||||||||||||||
Description: VMware ESXi, Workstation and Fusion contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1.Known Attack Vectors A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.Resolution To remediate CVE-2020-3981 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below. Workarounds: None |
||||||||||||||||
Response Matrix | Important | |||||||||||||||
Product | Version | Running On | CVE Identifier | CVSSv3 | Fixed Version | Workarounds | ||||||||||
ESXi | 7.0 | Any | CVE-2020-3981 | 7.1 | ESXi_7.0.1-0.0.16850804 | None | ||||||||||
ESXi | 6.7 | Any | CVE-2020-3981 | 7.1 | ESXi670-202008101-SG | None | ||||||||||
ESXi | 6.5 | Any | CVE-2020-3981 | 7.1 | ESXi650-202007101-SG | None | ||||||||||
Fusion | 12.x | OS X | CVE-2020-3981 | N/A | Unaffected | N/A | ||||||||||
Fusion | 11.x | OS X | CVE-2020-3981 | 7.1 | 11.5.6 | None | ||||||||||
Workstation | 16.x | Any | CVE-2020-3981 | N/A | Unaffected | N/A | ||||||||||
Workstation | 15.x | Any | CVE-2020-3981 | 7.1 | Patch pending | None | ||||||||||
Cloud Foundation (ESXi) | 4.x | Any | CVE-2020-3981 | 7.1 | 4.1 | None | ||||||||||
Cloud Foundation (ESXi) | 3.x | Any | CVE-2020-3981 | 7.1 | 3.10.1 | None | ||||||||||
3d. TOCTOU out-of-bounds write vulnerability (CVE-2020-3982) | ||||||||||||||||
Description: VMware ESXi, Workstation and Fusion contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.Known Attack Vectors A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine’s vmx process or corrupt hypervisor’s memory heap. Resolution To remediate CVE-2020-3982 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below. Workarounds: None |
||||||||||||||||
Response Matrix | Moderate | |||||||||||||||
Product | Version | Running On | CVE Identifier | CVSSv3 | Fixed Version | Workarounds | ||||||||||
ESXi | 7.0 | Any | CVE-2020-3982 | 5.9 | ESXi_7.0.1-0.0.16850804 | None | ||||||||||
ESXi | 6.7 | Any | CVE-2020-3982 | 5.9 | ESXi670-202008101-SG | None | ||||||||||
ESXi | 6.5 | Any | CVE-2020-3982 | 5.9 | ESXi650-202007101-SG | None | ||||||||||
Fusion | 12.x | OS X | CVE-2020-3982 | N/A | Unaffected | N/A | ||||||||||
Fusion | 11.x | OS X | CVE-2020-3982 | 5.9 | 11.5.6 | None | ||||||||||
Workstation | 16.x | Any | CVE-2020-3982 | N/A | Unaffected | N/A | ||||||||||
Workstation | 15.x | Any | CVE-2020-3982 | 5.9 | Patch pending | None | ||||||||||
Cloud Foundation (ESXi) | 4.x | Any | CVE-2020-3982 | 5.9 | 4.1 | None | ||||||||||
Cloud Foundation (ESXi) | 3.x | Any | CVE-2020-3982 | 5.9 | 3.10.1 | None | ||||||||||
3e. vCenter Server update function MITM vulnerability (CVE-2020-3994) | Important | |||||||||||||||
Description: VMware vCenter Server contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5.
Known Attack Vectors A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates. Resolution To remediate CVE-2020-3994 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below. Workarounds: None |
||||||||||||||||
Response Matrix | Important | |||||||||||||||
Product | Version | Running On | CVE Identifier | CVSSv3 | Fixed Version | Workarounds | ||||||||||
vCenter Server | 7.0 | Any | CVE-2020-3994 | N/A | Unaffected | N/A | ||||||||||
vCenter Server | 6.7 | vAppliance | CVE-2020-3994 | 7.5 | 6.7u3 | None | ||||||||||
vCenter Server | 6.7 | Windows | CVE-2020-3994 | N/A | Unaffected | N/A | ||||||||||
vCenter Server | 6.5 | vAppliance | CVE-2020-3994 | 7.5 | 6.5u3k | None | ||||||||||
vCenter Server | 6.5 | Windows | CVE-2020-3994 | N/A | Unaffected | N/A | ||||||||||
Cloud Foundation (vCenter) | 4.x | Any | CVE-2020-3994 | N/A | Unaffected | N/A | ||||||||||
Cloud Foundation (vCenter) | 3.x | Any | CVE-2020-3994 | 7.5 | 3.9.0 | None | ||||||||||
3f. VMCI host driver memory leak vulnerability (CVE-2020-3995) | Important | |||||||||||||||
Description: The VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1.
Known Attack Vectors A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time. Resolution To remediate CVE-2020-3995 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below. Workarounds: None. |
||||||||||||||||
Response Matrix | Important | |||||||||||||||
Product | Version | Running On | CVE Identifier | CVSSv3 | Fixed Version | Workarounds | ||||||||||
ESXi | 7.0 | Any | CVE-2020-3995 | N/A | Unaffected | N/A | ||||||||||
ESXi | 6.7 | Any | CVE-2020-3995 | 7.1 | ESXi670-201908101-SG | None | ||||||||||
ESXi | 6.5 | Any | CVE-2020-3995 | 7.1 | ESXi650-201907101-SG | None | ||||||||||
Fusion | 11.x | Any | CVE-2020-3995 | 7.1 | 11.1.0 | None | ||||||||||
Workstation | 15.x | Any | CVE-2020-3995 | 7.1 | 15.1.0 | None | ||||||||||
Cloud Foundation (ESXi) | 4.x | Any | CVE-2020-3995 | N/A | Unaffected | N/A | ||||||||||
Cloud Foundation (ESXi) | 3.x | Any | CVE-2020-3995 | 7.1 | 3.9.0 | None | ||||||||||
4. References | ||||||||||||||||
VMware ESXi 7.0 ESXi70U1a-17119627 (Updated)
VMware ESXi 6.7 ESXi670-202011301-SG (Updated) VMware ESXi670-202008101-SG (Included with August’s Release of ESXi670-202008001) VMware ESXi 6.7 ESXi670-202010401-SG VMware vCenter Server 6.7u3 VMware vCenter Server 6.5u3k VMware Workstation Pro 15.6 VMware Workstation Player 15.6 VMware Fusion 11.5.6 VMware NSX-T 3.0.2 VMware NSX-T 2.5.2.2.0 VMware vCloud Foundation 4.1 VMware vCloud Foundation 3.10.1 & 3.10.1 VMware vCloud Foundation 3.9.0 Mitre CVE Dictionary Links: FIRST CVSSv3 Calculator: |
||||||||||||||||
5. Change Log | ||||||||||||||||
2020-10-20 VMSA-2020-0023 Initial security advisory.
2020-11-04 VMSA-2020-0023.1 Updated ESXi patches for section 3a |
||||||||||||||||
Disclaimer | ||||||||||||||||
This enablement email derives from our VMware Security Advisory and is accurate at the time of creation. Bulletins maybe updated periodically, when using this email as future reference material, please refer to the full & updated VMware Security Advisory VMSA-2020-0023.1 | ||||||||||||||||