Learn about CVE-2020-3992, a use-after-free vulnerability in OpenSLP within VMware ESXi, allowing remote code execution. Find mitigation steps and necessary updates here.
OpenSLP in VMware ESXi versions 7.0, 6.7, and 6.5 before specified updates has a use-after-free vulnerability allowing remote code execution.
Understanding CVE-2020-3992
OpenSLP vulnerability in VMware ESXi
What is CVE-2020-3992?
CVE-2020-3992 is a use-after-free issue in OpenSLP within VMware ESXi versions 7.0, 6.7, and 6.5, potentially leading to remote code execution.
The Impact of CVE-2020-3992
The vulnerability allows a malicious actor on the management network to exploit port 427 on an ESXi machine, triggering a use-after-free in OpenSLP and enabling remote code execution.
Technical Details of CVE-2020-3992
Details of the vulnerability
Vulnerability Description
OpenSLP in VMware ESXi is susceptible to a use-after-free flaw, which can be exploited by an attacker to execute arbitrary code remotely.
Affected Systems and Versions
Exploitation Mechanism
A threat actor with access to port 427 on an ESXi machine in the management network can exploit the OpenSLP service, triggering the use-after-free vulnerability for remote code execution.
Mitigation and Prevention
Protecting against CVE-2020-3992
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates