CVE-2017-4933
high-risk
Published 2017-12-20
VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
Do I need to act?
~
7.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (6)
Third Party Advisory
http://www.securitytracker.com/id/1040024
Third Party Advisory
http://www.securitytracker.com/id/1040025
Third Party Advisory
http://www.securitytracker.com/id/1040024
Third Party Advisory
http://www.securitytracker.com/id/1040025
62
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
9/34 · Low
Exposure
23/34 · High