Description
The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).
References (2)
Core 2
Core References
Patch, Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2023-0014.html
Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800
Scores
CVSS v3
5.9
EPSS
0.0039
EPSS Percentile
59.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (3)
vmware/vcenter_server
7.0 (26 CPE variants)
vmware/vcenter_server
8.0 (6 CPE variants)
vmware/vcenter_server
4.0 - 7.0
Published
Jun 22, 2023
Tracked Since
Feb 18, 2026