team-bg-img
time 1 minute read

Helient Systems :

by Michael Trantas
Senior Solutions Architect

April 9, VMware announced a vulnerability in the VMware Directory Service (vmdir) for clients running vCenter Server version 6.7 . In certain conditions vmdir that ships with VMware vCenter Server, which as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.

A malicious actor with network access to an affected vmdir deployment may be able to extract highly sensitive information which could be used to compromise vCenter Server or other services dependent upon vmdir for authentication. VMware and CISA have assigned a vulnerability score of 10.0 – Maximum Critical.

This vulnerability can be resolved by upgrading an affected deployment to 6.7u3f or 7.0. See the table below.

Note: vCenter Server 6.7 (embedded or external PSC) prior to 6.7u3f is affected by CVE-2020-3952 if it was upgraded from a previous release line such as 6.0 or 6.5. Clean installations of vCenter Server 6.7 (embedded or external PSC) are not affected.

Product Version Running On CVE Identifier CVSSV3 Severity Fixed Version Workarounds Additional
Documentation
vCenter Server 7 Any CVE-2020-3952 N/A N/A Unaffected N/A N/A
vCenter Server 6.7 Virtual Appliance CVE-2020-3952 10 Critical 6.7u3f None KB78543
vCenter Server 6.7 Windows CVE-2020-3952 10 Critical 6.7u3f None KB78543
vCenter Server 6.5 Any CVE-2020-3952 N/A N/A Unaffected N/A N/A

If you would like additional assistance or consultative consulting from the Helient professionals, please contact service@helient.com.