ID CVE-2022-31680
Summary The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3t:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3t:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3u:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3u:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3r:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3r:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3s:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.5:update3s:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.0:update1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.0:update1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.0.0.10021:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.0.0.10021:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.0.0.12305:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.0.0.12305:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1:update_1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1:update_1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1:update_2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1:update_2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1.0.12319:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1.0.12319:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1.0.14766:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1.0.14766:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:4.1.0.17435:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:4.1.0.17435:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.0:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.0:beta:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.0:update_1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.0:update_1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.0:update_2_rc:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.0:update_2_rc:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.0.0.16964:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.0.0.16964:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:1a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:1a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:1b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:1b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:1c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:1c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:2b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:2b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:2d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:2d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:2e:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:2e:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:3:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:3:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:3a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:3a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:3b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:3b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:3d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:3d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:3e:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:3e:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:3f:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:3f:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:u1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:u1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:u2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:u2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:u3a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:u3a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:5.5:u3b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:5.5:u3b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:1b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:1b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:2a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:2a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:2m:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:2m:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:3:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:3:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:3a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:3a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:3b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:3b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:3c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:3c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u2a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u2a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u2m:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u2m:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3e:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3e:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3f:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3f:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3g:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3g:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3h:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3h:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:u3i:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:u3i:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcenter_server:6.0:update3j:*:*:*:*:*:*
    cpe:2.3:a:vmware:vcenter_server:6.0:update3j:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-502
CAPEC
  • Object Injection
    An adversary attempts to exploit an application by injecting additional, malicious content during its processing of serialized objects. Developers leverage serialization in order to convert data or state into a static, binary format for saving to disk or transferring over a network. These objects are then deserialized when needed to recover the data/state. By injecting a malformed object into a vulnerable application, an adversary can potentially compromise the application by manipulating the deserialization process. This can result in a number of unwanted outcomes, including remote code execution.
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 11-10-2022 - 13:37
Published 07-10-2022 - 21:15
Last modified 11-10-2022 - 13:37
Back to Top