<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Name : ESXi 6.5 / 6.7 / 7.0 Multiple Vulnerabilities (VMSA-2020-0026) in ESXi Discussions</title>
    <link>https://communities.vmware.com/t5/ESXi-Discussions/Vulnerability-Name-ESXi-6-5-6-7-7-0-Multiple-Vulnerabilities/m-p/2930888#M283905</link>
    <description>&lt;P&gt;Kindly remove xchi from VIB software package.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Sep 2022 08:10:43 GMT</pubDate>
    <dc:creator>faheem03a</dc:creator>
    <dc:date>2022-09-28T08:10:43Z</dc:date>
    <item>
      <title>Vulnerability Name : ESXi 6.5 / 6.7 / 7.0 Multiple Vulnerabilities (VMSA-2020-0026)</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/Vulnerability-Name-ESXi-6-5-6-7-7-0-Multiple-Vulnerabilities/m-p/2846278#M275900</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;
&lt;P&gt;Kindly assist us to fix the vulnerability in VMware Host&lt;/P&gt;
&lt;P&gt;Vulnerability Name :&amp;nbsp;ESXi 6.5 / 6.7 / 7.0 Multiple Vulnerabilities (VMSA-2020-0026)&lt;/P&gt;
&lt;P&gt;Severity :&amp;nbsp;High&lt;/P&gt;
&lt;P&gt;Port : 443&lt;/P&gt;
&lt;P&gt;Synopsis:The remote VMware ESXi host is missing a security patch and is affected by multiple vulnerabilities.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Description :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to its self-reported version number, the remote VMware ESXi host is version 6.5, 6.7 or 7.0 and is affected by multiple vulnerabilities.&lt;/P&gt;
&lt;P&gt;- A use-after-free error exists in the XHCI USB controller. An unauthenticated, local attacker with local administrative privileges on a virtual machine can exploit this, to execute code as the virtual machine's VMX process running on the host. (CVE-2020-4004)&lt;/P&gt;
&lt;P&gt;- A privilege escalation vulnerability exists in ESXi due to how certain system calls are managed. An authenticated, local attacker with privileges within the VPM process can exploit this, when chained with CVE-2020-4004, to obtain escalated privileges. (CVE-2020-4005)&lt;/P&gt;
&lt;P&gt;Solution :&amp;nbsp;Apply the appropriate patch as referenced in the vendor advisory.&lt;/P&gt;
&lt;P&gt;plugin :ESXi version : 6.5&lt;BR /&gt;Installed build : 13932383&lt;BR /&gt;Fixed build : 17167537&lt;/P&gt;
&lt;P&gt;CVE :CVE-2020-4004,CVE-2020-4005&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Moderator edit by wila: Moved post from Support Hub discussions to &lt;A href="https://communities.vmware.com/t5/ESXi-Discussions/bd-p/2006" target="_self"&gt;ESXi discussions&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 May 2021 12:17:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/Vulnerability-Name-ESXi-6-5-6-7-7-0-Multiple-Vulnerabilities/m-p/2846278#M275900</guid>
      <dc:creator>Shihas1</dc:creator>
      <dc:date>2021-05-10T12:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name : ESXi 6.5 / 6.7 / 7.0 Multiple Vulnerabilities (VMSA-2020-0026)</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/Vulnerability-Name-ESXi-6-5-6-7-7-0-Multiple-Vulnerabilities/m-p/2930888#M283905</link>
      <description>&lt;P&gt;Kindly remove xchi from VIB software package.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 08:10:43 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/Vulnerability-Name-ESXi-6-5-6-7-7-0-Multiple-Vulnerabilities/m-p/2930888#M283905</guid>
      <dc:creator>faheem03a</dc:creator>
      <dc:date>2022-09-28T08:10:43Z</dc:date>
    </item>
  </channel>
</rss>

