Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2023-20896 CVSS:5.9
VMware vCenter Server and VMware Cloud Foundation are vulnerable to a denial of service, caused by an out-of-bounds read in the implementation of the DCERPC protocol. By sending a specially crafted packet, a remote attacker could exploit this vulnerability to cause a denial of service in the vmcad, vmdird, and vmafdd services.
CVE-2023-20895 CVSS:8.1
VMware vCenter Server and VMware Cloud Foundation could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in the implementation of the DCERPC protocol. An attacker could exploit this vulnerability to execute arbitrary code on the system and bypass authentication.
CVE-2023-20894 CVSS:8.1
VMware vCenter Server and VMware Cloud Foundation could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in the implementation of the DCERPC protocol. By sending a specially crafted packet, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-20893 CVSS:8.1
VMware vCenter Server and VMware Cloud Foundation could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the implementation of the DCERPC protocol. An attacker could exploit this vulnerability to execute arbitrary code on the underlying operating system.
CVE-2023-20892 CVSS:8.1
VMware vCenter Server and VMware Cloud Foundation are vulnerable to a heap-based buffer overflow, caused by use of uninitialized memory in the implementation of the DCERPC protocol. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the underlying operating system.
VMware
Refer to VMware Security Advisory for patch, upgrade or suggested workaround information.