{"vulnerability": "CVE-2020-3952", "sightings": [{"uuid": "52d26785-b159-4f1a-959a-06f153834921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "ebc75cc9-e170-4cb7-b658-1748c0a29d68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:20.000000Z"}, {"uuid": "4d9da24a-c525-4cdc-bc73-f822d286f463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970896", "content": "", "creation_timestamp": "2024-12-24T20:21:24.788994Z"}, {"uuid": "647d89f7-9ac8-4919-ae07-e70e34fffae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "c09f2204-6f22-4a12-b325-1cc5f6f8d5c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:29.000000Z"}, {"uuid": "4c2c0781-6a66-4379-9f12-97389659461d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:48.000000Z"}, {"uuid": "dff4e3e5-a981-413c-89f3-be8d9d9508c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3xrj3ma4s2w", "content": "", "creation_timestamp": "2025-10-24T21:02:30.915769Z"}, {"uuid": "73d7c006-9238-4a47-a537-5ac501f7f556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2020/CVE-2020-3952.yaml", "content": "", "creation_timestamp": "2025-10-22T02:04:03.000000Z"}, {"uuid": "bb06c1b6-dc16-4c32-b1e9-3543db423cb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/vmware_vcenter_vmdir_ldap.rb", "content": "", "creation_timestamp": "2020-04-23T03:10:54.000000Z"}, {"uuid": "ca74250a-4e63-44e8-9f9c-97e9494051c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypass.rb", "content": "", "creation_timestamp": "2020-04-23T03:10:54.000000Z"}, {"uuid": "99a7a321-803f-4017-b50b-7d888d358360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-3952", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/0fa8f6cc-d35c-43b9-97bd-d4da356be60e", "content": "", "creation_timestamp": "2026-02-02T12:29:07.089148Z"}, {"uuid": "2e53aa4d-4bf3-4d5f-8365-af0f0d314009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/725", "content": "\u0420\u0435\u0431\u044f\u0442\u0430 \u0438\u0437 Guardicore \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0447\u0435\u0442\u0432\u0435\u0440\u0433\u0430 (CVE-2020-3952) \u0432 VMware vCenter 6.7, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a vCenter \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0435\u043b\u0438\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f VMware. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043a\u0440\u043e\u0438\u0442\u0441\u044f \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u043e\u0432 VMware Directory Service (vmdir). \n\n\u0412 \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u0435 \u043e\u043f\u0438\u0441\u0430\u043d \u043f\u043e\u043b\u043d\u044b\u0439 \u0446\u0438\u043a\u043b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2020-3952, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d \u0441\u0432\u0435\u0436\u0435\u043d\u044c\u043a\u0438\u0439 POC.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u044b vCenter Server 6.7, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u044b \u0441 6.0 \u0438\u043b\u0438 6.5. \u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u0441 \u043d\u0443\u043b\u044f 6.7 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d.\n\n&gt; https://www.guardicore.com/2020/04/pwning-vmware-vcenter-cve-2020-3952/\n&gt; https://www.vmware.com/security/advisories/VMSA-2020-0006.html", "creation_timestamp": "2020-04-16T12:54:03.000000Z"}, {"uuid": "3c11d3ee-00f9-42ae-839d-678689aed4fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://t.me/arpsyndicate/192", "content": "#ExploitObserverAlert\n\nCVE-2020-3952\n\nDESCRIPTION: Exploit Observer has 48 entries related to CVE-2020-3952. Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.\n\nFIRST-EPSS: 0.640320000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-17T03:48:58.000000Z"}, {"uuid": "3ab22ada-91e6-4159-9d3e-1839784be3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/434", "content": "What's a 10? Pwning vCenter with CVE-2020-3952\n\nContinue reading at guardicore.com (from /r/netsec)", "creation_timestamp": "2020-04-16T09:08:53.000000Z"}, {"uuid": "bc4f1b85-8d12-47ce-b79b-16868e96d407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://t.me/information_security_channel/36785", "content": "VMware patches a critical security vulnerability that allows malicious attackers to obtain sensitive information. The vulnerability can be tracked as CVE-2020-3952, it is rated as critical and receives a CVSSv3 score of 10. VMware vCenter Server Vulnerability The vulnerability resides in the VMware Directory Service (vmdir) which is a part of vCenter Server version 6.7 [\u2026]\nThe post Critical VMware Flaw Let Attackers to Hack VMware vCenter Server (https://gbhackers.com/vmware-vcenter-server-vulnerability/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-04-12T06:01:42.000000Z"}, {"uuid": "aa9dcfa0-967d-4ba2-b8dc-21c2903eb68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6388", "content": "WHAT\u2019S A 10? PWNING VCENTER WITH CVE-2020-3952\nhttps://www.guardicore.com/2020/04/pwning-vmware-vcenter-cve-2020-3952/", "creation_timestamp": "2020-04-16T14:45:23.000000Z"}, {"uuid": "2b8be0f9-cf63-4ab9-be14-5be57a2ab8ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://t.me/SecLabNews/7342", "content": "\u0412 \u0441\u0435\u0440\u0432\u0438\u0441\u0435 VMware Directory Service (vmdir) \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-3952), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u043c\u0443 \u0432\u0441\u0435\u0439 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b.      \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 VMware \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438", "creation_timestamp": "2020-04-13T15:30:02.000000Z"}, {"uuid": "50fbc0af-2f43-4b40-ae74-edc7b0b9ef55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/940", "content": "#exploit \nCVE-2020-3952: \nSensitive Information Disclosure in VMware vCenter Server 6.7 w/embedded or external Platform Services Controller (PSC)\nhttps://kb.vmware.com/s/article/78543\nhttps://www.vmware.com/security/advisories/VMSA-2020-0006.html", "creation_timestamp": "2024-01-20T22:06:47.000000Z"}, {"uuid": "a43f45f5-6c12-4f76-9c08-15b480c68a65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3952", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/976", "content": "#exploit\n1. CVE-2020-3243,\nCVE-2020-3247:\nAuthentication Bypass -\nSymlinking Your Way to Unauthenticated Access Against Cisco UCS Director\nhttps://srcincite.io/blog/2020/04/17/strike-three-symlinking-your-way-to-unauthenticated-access-against-cisco-ucs-director.html\n]-&gt;  PoC1,  PoC2\n\n2. CVE-2020-3952:\nVMware vCenter (6.7) Server updates address sensitive information disclosure vulnerability\nhttps://github.com/guardicore/vmware_vcenter_cve_2020_3952", "creation_timestamp": "2024-10-21T17:14:39.000000Z"}]}