CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

vmware

cloud_foundation

132 known vulnerabilities · sorted by CVSS score

CVE-2023-34063
CRITICAL9.9

Aria Automation contains a Missing Access Control vulnerability. An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows.

vmware / aria_automation+11
Network
Published Jan 16, 2024
Page 1 of 7
CVE-2024-38812
CRITICAL9.8

The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

vmware / cloud_foundation+48
Network
Published Sep 17, 2024
CVE-2021-21986
CRITICAL9.8

The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins. A malicious actor with network access to port 443 on vCenter Server may perform actions allowed by the impacted plug-ins without authentication.

vmware / vcenter_server+52
Network
Published May 26, 2021
CVE-2022-22972
CRITICAL9.8

VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.

vmware / identity_manager+59
Network
Published May 20, 2022
CVE-2021-22005
CRITICAL9.8

The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.

vmware / cloud_foundation+3
Network
Published Sep 23, 2021
CVE-2021-21985
CRITICAL9.8

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

vmware / vcenter_server+52
Network
Published May 26, 2021
CVE-2020-3992
CRITICAL9.8

OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.

vmware / cloud_foundation+223
Network
Published Oct 20, 2020
CVE-2021-21972
CRITICAL9.8

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).

vmware / cloud_foundation+42
Network
Published Feb 24, 2021
CVE-2023-20864
CRITICAL9.8

VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root.

vmware / aria_operations_for_logs+1
Network
Published Apr 20, 2023
CVE-2021-22002
CRITICAL9.8

VMware Workspace ONE Access and Identity Manager, allow the /cfg web app and diagnostic endpoints, on port 8443, to be accessed via port 443 using a custom host header. A malicious actor with network access to port 443 could tamper with host headers to facilitate access to the /cfg web app, in addition a malicious actor could access /cfg diagnostic endpoints without authentication.

vmware / identity_manager+15
Network
Published Aug 31, 2021
CVE-2022-22954
CRITICAL9.8

VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.

vmware / identity_manager+10
Network
Published Apr 11, 2022
CVE-2024-37079
CRITICAL9.8

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

vmware / cloud_foundation+43
Network
Published Jun 18, 2024
CVE-2021-21994
CRITICAL9.8

SFCB (Small Footprint CIM Broker) as used in ESXi has an authentication bypass vulnerability. A malicious actor with network access to port 5989 on ESXi may exploit this issue to bypass SFCB authentication by sending a specially crafted request.

vmware / cloud_foundation+237
Network
Published Jul 13, 2021
CVE-2024-22253
CRITICAL9.3

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

vmware / cloud_foundation+36
Local
Published Mar 5, 2024
CVE-2025-22224
CRITICAL9.3

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

vmware / esxi+55
Local
Published Mar 4, 2025
CVE-2020-4006
CRITICAL9.1

VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector address have a command injection vulnerability.

vmware / identity_manager+12
Network
Published Nov 23, 2020
CVE-2022-31678
CRITICAL9.1

VMware Cloud Foundation (NSX-V) contains an XML External Entity (XXE) vulnerability. On VCF 3.x instances with NSX-V deployed, this may allow a user to exploit this issue leading to a denial-of-service condition or unintended information disclosure.

vmware / cloud_foundation+1
Network
Published Oct 28, 2022
CVE-2023-20877
HIGH8.8

VMware Aria Operations contains a privilege escalation vulnerability. An authenticated malicious user with ReadOnly privileges can perform code execution leading to privilege escalation.

vmware / cloud_foundation+11
Network
Published May 12, 2023
CVE-2022-31696
HIGH8.8

VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox.

vmware / cloud_foundation+264
Local
Published Dec 13, 2022
CVE-2021-22048
HIGH8.8

The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism. A malicious actor with non-administrative access to vCenter Server may exploit this issue to elevate privileges to a higher privileged group.

vmware / cloud_foundation+4
Network
Published Nov 10, 2021