{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:29:45.006","vulnerabilities":[{"cve":{"id":"CVE-2023-20895","sourceIdentifier":"security@vmware.com","published":"2023-06-22T12:15:10.893","lastModified":"2024-11-21T07:41:46.400","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication."}],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","matchCriteriaId":"22B93342-5BD7-49A8-83E7-8B6D547F2EE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*","matchCriteriaId":"5FA81CCD-A05E-498C-820E-21980E92132F"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*","matchCriteriaId":"0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*","matchCriteriaId":"FB563627-C9CF-4D8A-B882-9AB65EAE9E15"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*","matchCriteriaId":"DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*","matchCriteriaId":"A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*","matchCriteriaId":"6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*","matchCriteriaId":"8725E544-2A94-4829-A683-1ECCE57A74A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*","matchCriteriaId":"0FC6765A-6584-45A8-9B21-4951D2EA8939"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*","matchCriteriaId":"85DD238C-EF73-44F0-928E-A94FF5C4B378"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*","matchCriteriaId":"F4CA36C1-732E-41AE-B847-F7411B753F3D"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*","matchCriteriaId":"0DA882B6-D811-4E4B-B614-2D48F0B9036E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*","matchCriteriaId":"8D30A78E-16D0-4A2E-A2F8-F6073698243E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*","matchCriteriaId":"188E103E-9568-4CE0-A984-141B2A9E82D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*","matchCriteriaId":"B266439F-E911-4C95-9D27-88DF96DDCCD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*","matchCriteriaId":"6508A908-EF14-4A72-AC75-5DA6F8B98A0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*","matchCriteriaId":"3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*","matchCriteriaId":"58597F18-0B23-4D21-9ABA-D9773958F10E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*","matchCriteriaId":"ADF46C54-313B-4742-A074-EEA0A6554680"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*","matchCriteriaId":"9587F800-57BC-44B6-870E-95691684FC46"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*","matchCriteriaId":"AD148A75-5076-416D-AFD6-0F281DA0A82B"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*","matchCriteriaId":"956CEA8C-F8C4-41BD-85B4-44FE3A772E50"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*","matchCriteriaId":"008AEA0F-116B-4AF8-B3A7-3041CCE25235"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*","matchCriteriaId":"EE486B2F-AED4-4FCE-A674-DFC25844FEFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*","matchCriteriaId":"4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*","matchCriteriaId":"455DD46E-A071-476D-8914-767485E45F35"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*","matchCriteriaId":"3A422D04-48DF-4A16-94F8-D5702CC2782D"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*","matchCriteriaId":"CC974CA1-88D3-42E4-BF1F-28870F8171B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*","matchCriteriaId":"EFE63984-F69B-4593-9AEC-D179D6D98B08"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*","matchCriteriaId":"34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*","matchCriteriaId":"16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*","matchCriteriaId":"C745A7E6-4760-48CD-B7C4-1C2C20217F21"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*","matchCriteriaId":"A5522514-8ED9-45DB-9036-33FE40D77E7D"}]}]}],"references":[{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740","source":"security@vmware.com"},{"url":"https://www.vmware.com/security/advisories/VMSA-2023-0014.html","source":"security@vmware.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.vmware.com/security/advisories/VMSA-2023-0014.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}