VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| vmware | cloud_foundation | 3.0 - 3.10 | - |
| vmware | cloud_foundation | 4.0.0 - 4.0.1 | - |
| vmware | fusion | 11.0.0 - 11.5.5 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
180
Affected Products
4
References
vmware / cloud_foundation
| - |
| vmware | workstation | 15.0.0 - 15.5.5 | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
| vmware | esxi | - | - |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Exploitability
Impact