CVE-2020-3952
CRITICAL KEV NUCLEIVMware vCenter Server vmdir Information Disclosure
Title source: metasploitDescription
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
Exploits (8)
nomisec
WORKING POC
275 stars
by guardicore · remote
https://github.com/guardicore/vmware_vcenter_cve_2020_3952
nomisec
WORKING POC
3 stars
by Fa1c0n35 · remote
https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952
metasploit
WORKING POC
by Hynek Petrak, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/vmware_vcenter_vmdir_ldap.rb
metasploit
WORKING POC
by Hynek Petrak, JJ Lehmann, Ofri Ziv, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypass.rb
Nuclei Templates (1)
VMware vCenter Server LDAP Broken Access Control
CRITICALby 0x_Akoko
References (3)
Scores
CVSS v3
9.8
EPSS
0.9439
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-11-03
VulnCheck KEV
2021-11-03
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2020-25217
Classification
CWE
CWE-306
Status
published
Affected Products (1)
vmware/vcenter_server
Timeline
Published
Apr 10, 2020
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026