The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.
References
Link | Resource |
---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587 | Exploit Third Party Advisory |
https://www.vmware.com/security/advisories/VMSA-2022-0025.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
11 Oct 2022, 13:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-502 | |
First Time |
Vmware vcenter Server
Vmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | (MISC) https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587 - Exploit, Third Party Advisory | |
References | (MISC) https://www.vmware.com/security/advisories/VMSA-2022-0025.html - Vendor Advisory | |
CPE | cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3u:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3r:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3t:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3s:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:* |
10 Oct 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Oct 2022, 00:57
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-07 21:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-31680
Mitre link : CVE-2022-31680
CVE.ORG link : CVE-2022-31680
JSON object : View
Products Affected
vmware
- vcenter_server
CWE
CWE-502
Deserialization of Untrusted Data