VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine's vmx process leading to a partial denial of service.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
186
Affected Products
2
References
vmware / fusion +185 more
| - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Exploitability
Impact