CVE-2020-3952

CRITICAL KEV NUCLEI

VMware vCenter Server vmdir Information Disclosure

Title source: metasploit

Description

Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.

Exploits (8)

nomisec WORKING POC 275 stars
by guardicore · remote
https://github.com/guardicore/vmware_vcenter_cve_2020_3952
nomisec WORKING POC 7 stars
by bb33bb · poc
https://github.com/bb33bb/CVE-2020-3952
nomisec SCANNER 4 stars
by chronoloper · poc
https://github.com/chronoloper/CVE-2020-3952
nomisec WORKING POC 3 stars
by Fa1c0n35 · remote
https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952
nomisec WORKING POC 1 stars
by gelim · remote
https://github.com/gelim/CVE-2020-3952
metasploit WORKING POC
by Hynek Petrak, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/vmware_vcenter_vmdir_ldap.rb
exploitdb WORKING POC
by Photubias · textwebappsmultiple
https://www.exploit-db.com/exploits/48535
metasploit WORKING POC
by Hynek Petrak, JJ Lehmann, Ofri Ziv, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypass.rb

Nuclei Templates (1)

VMware vCenter Server LDAP Broken Access Control
CRITICALby 0x_Akoko

Scores

CVSS v3 9.8
EPSS 0.9439
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2021-11-03
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2020-25217

Classification

CWE
CWE-306
Status published

Affected Products (1)

vmware/vcenter_server

Timeline

Published Apr 10, 2020
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026