The vCenter Server contains a denial-of-service vulnerability in the content library service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to trigger a denial-of-service condition by sending a specially crafted header.
References
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:47
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Dec 2022, 17:45
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.vmware.com/security/advisories/VMSA-2022-0030.html - Vendor Advisory | |
CPE | cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3r:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.0.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.5.1:*:*:*:*:*:*:* cpe:2.3:o:vmware:cloud_foundation:3.10.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3n:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.9.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3o:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3p:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.10.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.8:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.8.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.10.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3t:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.10.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.9:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3s:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.11:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.7.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3q:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.10.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.7.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update_3o:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3r:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:* cpe:2.3:o:vmware:cloud_foundation:4.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.10.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:3.10:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Vmware
Vmware cloud Foundation Vmware vcenter Server |
13 Dec 2022, 16:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-13 16:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-31698
Mitre link : CVE-2022-31698
CVE.ORG link : CVE-2022-31698
JSON object : View
Products Affected
vmware
- vcenter_server
- cloud_foundation
CWE