{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T14:54:37.517","vulnerabilities":[{"cve":{"id":"CVE-2020-3980","sourceIdentifier":"security@vmware.com","published":"2020-09-16T17:15:13.827","lastModified":"2024-11-21T05:32:06.280","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed."},{"lang":"es","value":"VMware Fusion (versión 11.x), contiene una vulnerabilidad de escalamiento de privilegios debido a la forma en que permite configurar la ruta amplia del sistema.&#xa0;Un atacante con privilegios de usuario normales puede ser capaz de explotar este problema para engañar a un usuario administrador para que ejecute código malicioso en el sistema donde está instalado Fusion"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"12.0.0","matchCriteriaId":"F2E41C3F-1DCF-445A-82C4-C7C8FC225C40"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","matchCriteriaId":"4781BF1E-8A4E-4AFF-9540-23D523EE30DD"}]}]}],"references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2020-0020.html","source":"security@vmware.com","tags":["Vendor Advisory"]},{"url":"https://www.vmware.com/security/advisories/VMSA-2020-0020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}