fkie_cve-2021-21974
Vulnerability from fkie_nvd
Published
2021-02-24 17:15
Modified
2024-11-21 05:49
Severity ?
Summary
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
References
▼ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html | Exploit, Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2021-0002.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-21-250/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2021-0002.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-250/ | Third Party Advisory, VDB Entry |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", matchCriteriaId: "1995769A-1AB9-47FA-966A-8E82D414161E", versionEndExcluding: "3.10.1.2", versionStartIncluding: "3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", matchCriteriaId: "A608D809-6E65-4228-9207-CB470529C542", versionEndExcluding: "4.2", versionStartIncluding: "4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", matchCriteriaId: "FBA15143-734D-4889-8B5A-2445A2DDDD4B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", matchCriteriaId: "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", matchCriteriaId: "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", matchCriteriaId: "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", matchCriteriaId: "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", matchCriteriaId: "F948E806-0F73-4145-A723-7A43BA45842B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", matchCriteriaId: "75FAFF86-C65F-4723-8A63-BACE2F797937", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", matchCriteriaId: "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", matchCriteriaId: "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", matchCriteriaId: "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", matchCriteriaId: "830B0BC1-A368-49AC-B6C9-B000972EF92A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", matchCriteriaId: "614394F3-3BEE-4E12-AABF-436D54A04313", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", matchCriteriaId: "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", matchCriteriaId: "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", matchCriteriaId: "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", matchCriteriaId: "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", matchCriteriaId: "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", matchCriteriaId: "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", matchCriteriaId: "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", matchCriteriaId: "B1CE5849-01B1-4E36-83E8-496A3F328C9C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", matchCriteriaId: "A879BA05-3A80-4EBC-AA9D-9B53695425B4", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", matchCriteriaId: "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", matchCriteriaId: "80C10150-39BA-4818-B48F-8645D4A0D316", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", matchCriteriaId: "9792B986-86EF-40E0-9427-A45F858717E1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", matchCriteriaId: "37EDD688-C91A-4A35-913A-82E156ADD242", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", matchCriteriaId: "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", matchCriteriaId: "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", matchCriteriaId: "76EB1A04-0645-4909-AEF9-33D6FADA4793", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", matchCriteriaId: "F1A35723-D968-42D6-89EB-86CA550516E6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", matchCriteriaId: "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", matchCriteriaId: "2D6A3952-8429-4762-8701-47D7C1F05A5F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", matchCriteriaId: "5B007609-C312-469B-BACF-04D6D80DADF7", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", matchCriteriaId: "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", matchCriteriaId: "3594E391-19CD-4803-8285-FA11BE63AB05", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", matchCriteriaId: "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", matchCriteriaId: "4F08529C-B14C-45FB-AEA1-77D12C88CB30", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", matchCriteriaId: "617835F5-49DA-4B42-8C7B-C122D7363A00", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", matchCriteriaId: "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", matchCriteriaId: "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", matchCriteriaId: "DE1372AD-2853-4BED-BB71-6BACB28B95C9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", matchCriteriaId: "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", matchCriteriaId: "B3DDD3E9-186F-472C-BA76-C2A363206792", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", matchCriteriaId: "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", matchCriteriaId: "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", matchCriteriaId: "4F8219B4-1FC2-4383-83E6-92DF700C72D6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", matchCriteriaId: "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", matchCriteriaId: "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", matchCriteriaId: "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", matchCriteriaId: "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", matchCriteriaId: "2D217AAB-D45F-480B-8F82-16B261F370D1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", matchCriteriaId: "1B58312B-D72B-4F13-9EF5-0F42CE592757", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", matchCriteriaId: "8FBB88C2-793A-40F2-AA40-EC315115AE0C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", matchCriteriaId: "21F59801-904B-427F-A1A9-C933E38AB7AB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", matchCriteriaId: "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", matchCriteriaId: "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", matchCriteriaId: "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", matchCriteriaId: "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", matchCriteriaId: "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", matchCriteriaId: "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", matchCriteriaId: "6741A159-1D92-4E25-BD43-606DE1138D49", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", matchCriteriaId: "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*", matchCriteriaId: "C565246C-896C-4E48-8C24-344C9B0A3057", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*", matchCriteriaId: "8479F377-4F47-433D-867D-A94A4B0E46EC", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202010001:*:*:*:*:*:*", matchCriteriaId: "ECC2468D-6B23-4C7E-951B-DDA8DD17B51E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202011001:*:*:*:*:*:*", matchCriteriaId: "2CB7210B-C9FC-41FA-A258-1F6EC737E9BA", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202011002:*:*:*:*:*:*", matchCriteriaId: "3279299C-37AD-47DF-B22A-20562D13AD80", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.5:650-202102001:*:*:*:*:*:*", matchCriteriaId: "91032EB0-AC08-459A-8D78-C7412AE64E3F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", matchCriteriaId: "B2792D06-A73E-4A56-A152-82E1AD4E707D", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", matchCriteriaId: "0CE9D758-2170-4ACD-965C-C76BDA693466", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", matchCriteriaId: "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", matchCriteriaId: "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", matchCriteriaId: "8B75B45F-E25A-4362-856D-465A9F8B70DB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", matchCriteriaId: "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", matchCriteriaId: "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", matchCriteriaId: "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", matchCriteriaId: "047A71B3-CDFB-41F3-B2DE-11360DAE5744", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", matchCriteriaId: "F88691FD-F263-4B75-BF21-481BC1623C3C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", matchCriteriaId: "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", matchCriteriaId: "36A67476-2E8E-4104-9F10-7AE42F82508F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", matchCriteriaId: "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", matchCriteriaId: "E2283675-582F-44A8-833B-B5B439CBFA1E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", matchCriteriaId: "94C4A188-6B00-48C4-B7E2-9F70811BF618", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", matchCriteriaId: "F82943E9-E2D0-49F4-BD32-40E84BA1957E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", matchCriteriaId: "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", matchCriteriaId: "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", matchCriteriaId: "554434AB-763F-4E95-B616-F7594041D511", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", matchCriteriaId: "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", matchCriteriaId: "36664142-0111-42F5-A371-AD2C0DF211EF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", matchCriteriaId: "49EA78B6-8208-4351-88F9-103CA01EF3A1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", matchCriteriaId: "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", matchCriteriaId: "4C0F47F3-0509-45AC-8EA9-37246E4E6095", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", matchCriteriaId: "CE103301-6AEF-4348-8F36-833021739AEF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", matchCriteriaId: "8D92B2FF-8962-41F9-B019-D83AAAD188FC", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", matchCriteriaId: "8E6D5227-3421-412F-9BE0-583AA768446D", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", matchCriteriaId: "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", matchCriteriaId: "82BA9EB1-4EFB-4649-92C7-2C307966956E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", matchCriteriaId: "2133378D-8DFD-48B9-83A1-9FA7DDC68902", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", matchCriteriaId: "57BF8703-0C83-4BA5-B0F7-FB6E45229685", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", matchCriteriaId: "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", matchCriteriaId: "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", matchCriteriaId: "27FA0C0E-B5A2-4619-998B-CFB45496D895", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", matchCriteriaId: "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", matchCriteriaId: "8E756914-2C2A-4999-AAEA-2F6835A29C49", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", matchCriteriaId: "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", matchCriteriaId: "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", matchCriteriaId: "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", matchCriteriaId: "CF41887D-B145-4D01-9AEF-2E36479B2FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", matchCriteriaId: "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", matchCriteriaId: "36234CE1-FA7E-4534-9720-410435E2BAEE", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", matchCriteriaId: "ABE65721-57C0-4748-B159-F6D97CE8CAB9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", matchCriteriaId: "CD1889D7-3313-4004-AA42-7879E8551413", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", matchCriteriaId: "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", matchCriteriaId: "DD046237-16D7-4A57-9F09-2A6A649368C6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", matchCriteriaId: "8343E8DB-1D54-4B82-9254-2E2AFC548609", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", matchCriteriaId: "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", matchCriteriaId: "0169E032-F47A-45E0-BC33-B7DF54EC11BF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", matchCriteriaId: "B0FCF0BB-9905-415A-8E30-DB96CCC49782", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", matchCriteriaId: "7264CDC9-FB2D-45A9-9307-C197B1052477", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", matchCriteriaId: "0C02E0DF-7656-475B-B028-10406DAB30F9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", matchCriteriaId: "D0538570-759A-441A-BC37-556642C090F9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", matchCriteriaId: "41340C91-4E96-4578-BB96-6758EBE072E6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", matchCriteriaId: "9CF906E5-A846-49BA-925B-C6059FD02BFB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", matchCriteriaId: "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", matchCriteriaId: "7D3D0230-53D4-469F-AD46-74F057F6F9B7", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", matchCriteriaId: "322DC091-A4A1-4534-AB5C-0030114A63D9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", matchCriteriaId: "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", matchCriteriaId: "4B23002D-D157-412F-B2ED-CD4504C79987", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", matchCriteriaId: "73DA1453-4756-4C16-9640-B3B0C6F617DF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", matchCriteriaId: "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", matchCriteriaId: "589EE886-6927-4AEA-903C-155C23B1747A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", matchCriteriaId: "4547B798-9F00-4B28-B667-9D38B9E3591B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", matchCriteriaId: "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", matchCriteriaId: "53129601-DDA4-4BF4-8F63-A88890F2D7B5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", matchCriteriaId: "3F931502-8460-4373-92D7-CFD817F4A062", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", matchCriteriaId: "B48B12F8-0B49-404E-A6B4-1F6108687C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", matchCriteriaId: "287D4E48-4890-46C2-8B9B-1CE484C9D30A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", matchCriteriaId: "8CED027A-5B1B-44CC-81DA-AAD00D551C84", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", matchCriteriaId: "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", matchCriteriaId: "94F87F69-37DD-4170-ACA0-742EE8CFD00E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", matchCriteriaId: "BC024B88-DEDD-49E5-B668-5B00C212B6A9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", matchCriteriaId: "ACC3D191-BB1B-4875-9A58-1E6D53128062", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", matchCriteriaId: "DB9F131B-46BE-44F8-904B-FD0839926B18", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", matchCriteriaId: "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", matchCriteriaId: "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", matchCriteriaId: "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", matchCriteriaId: "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", matchCriteriaId: "62772E13-0198-4021-9FB0-59124086B21C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", matchCriteriaId: "7BD28EE0-808D-4A76-B707-F163527608C5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", matchCriteriaId: "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", matchCriteriaId: "79225541-575F-44FC-8ED6-24BA6A4128EF", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", matchCriteriaId: "7B8868CD-EA52-438C-BFDD-EB41C98BA425", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", matchCriteriaId: "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", matchCriteriaId: "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", matchCriteriaId: "D526CE1D-ED76-44EB-9377-53EF7556E254", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", matchCriteriaId: "00ECE661-E187-4999-B2CC-CF0EBAE83253", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", matchCriteriaId: "D7E92A1C-40EB-441B-A634-42609527210A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", matchCriteriaId: "6C225598-9636-4095-84FE-DD671F2D6000", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", matchCriteriaId: "111A10BE-FC5A-4272-9719-1DED62694A7A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", matchCriteriaId: "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", matchCriteriaId: "FC65FCFC-CD55-401A-8986-A1DBF544D228", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", matchCriteriaId: "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", matchCriteriaId: "EEBD3AEC-284C-44E1-A4CD-010787114737", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", matchCriteriaId: "41DE747D-30C9-470D-8447-47B8C95311EA", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", matchCriteriaId: "42F87C20-5A00-43C9-A445-50AD716233D9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", matchCriteriaId: "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", matchCriteriaId: "C1412AFC-CBE8-4151-B01D-785F11ACAB85", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", matchCriteriaId: "97F27723-5065-4A57-AF07-F9BD35B9B32C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*", matchCriteriaId: "6431DD1F-2269-4AFB-B486-9B6373F41C57", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", matchCriteriaId: "94383F22-6A4B-43A5-BA4D-6D25698DFF00", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*", matchCriteriaId: "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", matchCriteriaId: "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*", matchCriteriaId: "A86BDAB4-3924-45A8-9130-517DEA184FA2", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", matchCriteriaId: "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*", matchCriteriaId: "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", matchCriteriaId: "00CF4E83-EA1C-4058-8BCC-09B495255F71", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", matchCriteriaId: "86626D15-8D73-48BA-970B-CE661D5BB59A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", matchCriteriaId: "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", matchCriteriaId: "9969057F-BD3A-474E-8A02-087575A8AA92", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", matchCriteriaId: "7111974A-2A88-4209-8CBB-F872993AE4BB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", matchCriteriaId: "35722902-3652-44F1-89C2-08EB51F2A1B9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", matchCriteriaId: "E469AC46-D464-4960-8F23-CA59B3DCB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", matchCriteriaId: "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", matchCriteriaId: "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", matchCriteriaId: "739948F5-E005-49E3-B412-4E035C7D95E2", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", matchCriteriaId: "D1828A75-5088-4992-A06B-A58B62536F4B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", matchCriteriaId: "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", matchCriteriaId: "9A013753-5E40-4CD8-A649-6CD023E0A970", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", matchCriteriaId: "F554BC79-A92C-4287-9D94-3657C48E36CE", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", matchCriteriaId: "F82710D4-3FAB-469F-B15C-F22B4786AE42", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", matchCriteriaId: "BDE7B96D-AD37-406D-AF62-3797E7A55119", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", matchCriteriaId: "A9C294EC-F0BE-44DA-9073-D29D693F0964", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", matchCriteriaId: "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", matchCriteriaId: "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", matchCriteriaId: "C7B7079D-785C-4941-929A-C82B54809728", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", matchCriteriaId: "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", matchCriteriaId: "31F8FFF5-25BD-408D-9089-567AF16BA608", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", matchCriteriaId: "EE834CFD-5533-4989-8836-D0F07ED4919C", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", matchCriteriaId: "092F9149-6B82-48CD-B90C-87DB36881F5B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", matchCriteriaId: "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", matchCriteriaId: "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", matchCriteriaId: "755CCD27-3C87-497F-BDBB-48D3163909A6", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", matchCriteriaId: "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", matchCriteriaId: "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", matchCriteriaId: "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", matchCriteriaId: "802A1549-678C-4001-807B-97AD0953B5A3", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", matchCriteriaId: "A6024926-4AE4-4609-99DE-E3173A72058A", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", matchCriteriaId: "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", matchCriteriaId: "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", matchCriteriaId: "13C713B1-AEA0-40B0-829E-4D0A23808577", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", matchCriteriaId: "4C501A11-EF97-4402-9366-E624F1CBEDEA", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", matchCriteriaId: "52AE4120-4AAE-4F15-8575-4C480FBF7817", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", matchCriteriaId: "04BAED99-1BF3-4089-B6E6-0BE505E6D846", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", matchCriteriaId: "F318EA34-1EB7-484D-B016-3173683B0823", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", matchCriteriaId: "08254171-3483-4796-AD29-8C8A66BEA7A2", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", matchCriteriaId: "BB87B220-ED25-4818-8E70-A9663CCEF005", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", matchCriteriaId: "1275D19D-05C0-42F8-8402-647E512DAC72", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", matchCriteriaId: "7D919EB9-F45B-4A4B-9887-7DE98065B766", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", matchCriteriaId: "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", matchCriteriaId: "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", matchCriteriaId: "92E98665-4919-4D45-88CF-28835DADD6E5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", matchCriteriaId: "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", matchCriteriaId: "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*", matchCriteriaId: "18E8632C-E442-4F18-BFE2-96AE5C839F0E", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202011001:*:*:*:*:*:*", matchCriteriaId: "13D69B99-CB36-45DD-9FD9-C58186998200", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202011002:*:*:*:*:*:*", matchCriteriaId: "EF0BC157-1834-46D8-9BF9-0CE9648C7D8B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:6.7:670-202102001:*:*:*:*:*:*", matchCriteriaId: "728136B6-47A7-42BC-9464-7745E4F2B4FB", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", matchCriteriaId: "70F4DA98-C1D3-489E-958C-B466BEAD772B", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*", matchCriteriaId: "BC6F088D-0404-4588-9788-7A5903C5BC82", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:7.0.0:update_1:*:*:*:*:*:*", matchCriteriaId: "18371326-D0DD-4E7B-AF9E-5963C73FB5C5", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:7.0.0:update_1a:*:*:*:*:*:*", matchCriteriaId: "A785B3DD-929D-4F2F-829D-89F231EC2A10", vulnerable: true, }, { criteria: "cpe:2.3:o:vmware:esxi:7.0.0:update_1b:*:*:*:*:*:*", matchCriteriaId: "CA82984F-607E-4A81-ACDC-8DED0D45F14F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.", }, { lang: "es", value: "OpenSLP como es usado en ESXi (versiones 7.0 anteriores a ESXi70U1c-17325551, versiones 6.7 anteriores a ESXi670-202102401-SG, versiones 6.5 anteriores a ESXi650-202102101-SG), presenta una vulnerabilidad de desbordamiento de la pila. Un actor malicioso que reside dentro del mismo segmento de red que ESXi y que presenta acceso al puerto 427 puede desencadenar el problema de desbordamiento de la pila en el servicio OpenSLP, resultando en una ejecución de código remota", }, ], id: "CVE-2021-21974", lastModified: "2024-11-21T05:49:21.173", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-02-24T17:15:16.017", references: [ { source: "security@vmware.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html", }, { source: "security@vmware.com", tags: [ "Vendor Advisory", ], url: "https://www.vmware.com/security/advisories/VMSA-2021-0002.html", }, { source: "security@vmware.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-250/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.vmware.com/security/advisories/VMSA-2021-0002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-250/", }, ], sourceIdentifier: "security@vmware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.