Description
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-25270 | VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004) |
References
History
Fri, 31 Oct 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-04T07:52:20.623Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2020-4005
No data.
Status : Modified
Published: 2020-11-20T20:15:13.287
Modified: 2025-10-31T11:44:38.620
Link: CVE-2020-4005
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD