|Synopsis||VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability (CVE-2020-3955)|
|Updated On||2020-04-28 (Initial Advisory)|
1. Impacted Products
A Stored Cross-Site Scripting (XSS) vulnerability in VMware ESXi was privately reported to VMware. Patches are available to address this vulnerability in affected VMware products.
3. VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability (CVE-2020-3955)
The VMware ESXi Host Client does not properly neutralize script-related HTML when viewing virtual machines attributes. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.3.
Known Attack Vectors:
A malicious actor with access to modify the system properties of a virtual machine from inside the guest os (such as changing the hostname of the virtual machine) may be able to inject malicious script which will be executed by a victim's browser when viewing this virtual machine via the ESXi Host Client.
To remediate CVE-2020-3955 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below.
VMware would like to thank Benny Husted, zixian, and DAWUSHI for independently reporting this issue to us.
|Product||Version||Running On||CVE Identifier||CVSSV3||Severity||Fixed Version||Workarounds||Additional Documentation|
Fixed Version(s) and Release Notes:
VMware ESXi 6.7 ESXi670-202004103-SG
VMware ESXi 6.5 ESXi650-201912104-SG
Mitre CVE Dictionary Links:
FIRST CVSSv3 Calculator:
5. Change log
Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2020 VMware Inc. All rights reserved.