Home / Vulnerabilities / CVE-2020-3992
CRITICAL SEVERITY Ransomware Linked
CVE-2020-3992 VMware · ESXi

VMware ESXi OpenSLP Use-After-Free Vulnerability

Critical Threat Advisory: This vulnerability is documented in active Ransomware campaigns. Immediate remediation required.

Technical Severity

CVSS v3.1 Metrics

CRITICAL
9.8 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Likelihood

EPSS Prediction

82.69 %
Predictive Probability
Percentile Rank
99.2 th

Documented as more likely to be exploited than 99.2% of known CVEs.

Detection Date

Nov 03, 2021

Remediation Due

May 03, 2022

CISA Catalog Active

Threat Analysis

VMware ESXi OpenSLP contains a use-after-free vulnerability that allows an attacker residing in the management network with access to port 427 to perform remote code execution.

Remediation Directive

Apply updates per vendor instructions.

External Intelligence