Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.1457 VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability (CVE-2020-3955) 29 April 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware ESXi Publisher: VMWare Operating System: VMware ESX Server Impact/Access: Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-3955 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2020-0008.html - --------------------------BEGIN INCLUDED TEXT-------------------- VMware Security Advisories +------------+----------------------------------------------------------------+ |Advisory ID |VMSA-2020-0008 | +------------+----------------------------------------------------------------+ |Advisory |Important | |Severity | | +------------+----------------------------------------------------------------+ |CVSSv3 Range|8.3 | +------------+----------------------------------------------------------------+ |Synopsis |VMware ESXi patches address Stored Cross-Site Scripting (XSS) | | |vulnerability (CVE-2020-3955) | +------------+----------------------------------------------------------------+ |Issue Date |2020-04-28 | +------------+----------------------------------------------------------------+ |Updated On |2020-04-28 (Initial Advisory) | +------------+----------------------------------------------------------------+ |CVE(s) |CVE-2020-3955 | +------------+----------------------------------------------------------------+ 1. Impacted Products VMware ESXi 2. Introduction A Stored Cross-Site Scripting (XSS) vulnerability in VMware ESXi was privately reported to VMware. Patches are available to address this vulnerability in affected VMware products. 3. VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability (CVE-2020-3955) Description: The VMware ESXi Host Client does not properly neutralize script-related HTML when viewing virtual machines attributes. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.3. Known Attack Vectors: A malicious actor with access to modify the system properties of a virtual machine from inside the guest os (such as changing the hostname of the virtual machine) may be able to inject malicious script which will be executed by a victim's browser when viewing this virtual machine via the ESXi Host Client. Resolution: To remediate CVE-2020-3955 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below. Workarounds: None. Additional Documentation: None. Notes: None. Acknowledgements: VMware would like to thank Benny Husted and DAWUSHI for independently reporting this issue to us. +-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+ |Product|Version|Running|CVE |CVSSV3|Severity |Fixed Version |Workarounds|Additional | | | |On |Identifier | | | | |Documentation| +-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+ |ESXi |7.0 |Any |CVE-2020-3955|N/A |N/A |Unaffected |N/A |N/A | +-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+ |ESXi |6.7 |Any |CVE-2020-3955|8.3 |Important|ESXi670-202004103-SG|None |None | +-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+ |ESXi |6.5 |Any |CVE-2020-3955|8.3 |Important|ESXi650-201912104-SG|None |None | +-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+ 4. References Fixed Version(s) and Release Notes: VMware ESXi 6.7 ESXi670-202004103-SG https://my.vmware.com/group/vmware/patch https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202004002.html VMware ESXi 6.5 ESXi650-201912104-SG https://my.vmware.com/group/vmware/patch https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-201912002.html Mitre CVE Dictionary Links: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3955 FIRST CVSSv3 Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/ I:H/A:H 5. Change log 2020-04-28 VMSA-2020-0008 Initial security advisory. 6. Contact E-mail list for product security notifications and announcements: https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2020 VMware Inc. All rights reserved. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXqjOJmaOgq3Tt24GAQjoChAAkpxiduFHd29baqz2d080qTcq2RnYsLx9 Eyx/AhIFcfTUe1YFJOp23iipyJEk8aCzG62JkIkD3hJ9SBcjmJUPqEL/ppD+mmo+ 1jpX+K9B5jMwdIdiFiqksUgLtZrpZlINTG0dNY7SK5aWfdDFLM9q1+sfTdiHzbm3 h+WkVtx2cZTflH3IiozfmUxpG1XZ48ku2MrRrq8LD54H1Vi7IXVe/G9P6zfjAj3r JUPzjJPP8JopOBd8BuNReRRrIJ+W92u6cls8d7P5zR1m9qnskyQoz7rPguwWeAml U2EJgtQ1uWd0c5yRAPWg411ETeZk3vMTNfpxRMLsHGaHoGP3SqE3mxCMZ7VoaMgB tfxuymOS75uHWSWjwVjW1yR3qcG40wqSr9UDaQhf4L/FtNCxcpnB38+JzovUUEPI QGFS6IuWixvtK14kENkOTM1Uhl16v5QflhEQcgF3w2TVU2AJXgK02UMY+voqTVFR Xcjl84ei0OwLRR/iPXkI4LVkmET/6RHCC7Hu2ulJpr0LEYmSDWSjU/f9Qxxtz1XW nRTHPL2kYW2r6+3qE7R1cm7RC2ovZ81rCgiJAlRrGLUG1fMSoRlaaOJ1NkOuVctB wn9QH9i6pIisSM6SzHlmFJD/OIff2QPGPuzbVnEWSxrmb3Bx2WVDbHx/BQI6jmJY 7OXyDHRzYic= =resa -----END PGP SIGNATURE-----