
Cloud Vulnerability DB
A community-led vulnerabilities database
VMware ESXi contains a memory corruption vulnerability (CVE-2022-31696) that exists in the way it handles a network socket. The vulnerability was discovered and reported by Reno Robert of Trend Micro Zero Day Initiative and was publicly disclosed on December 8, 2022. This vulnerability affects VMware ESXi versions 6.5, 6.7, and 7.0, while version 8.0 is not impacted (VMware Advisory).
The vulnerability has been assigned a CVSSv3 base score of 7.5, categorizing it as 'Important' severity. The technical assessment reveals that the vulnerability specifically relates to memory corruption in network socket handling within the ESXi environment. The CVSS vector string indicates local access requirements with high complexity and high privileges needed for exploitation (FIRST CVSSv3).
If successfully exploited, this vulnerability could lead to memory corruption, potentially resulting in an escape of the ESXi sandbox. This presents a significant security risk as it could allow attackers to break out of their confined environment and potentially gain broader access to the system (VMware Advisory).
VMware has released patches for affected versions: ESXi70U3si-20841705 for version 7.0, ESXi670-202210101-SG for version 6.7, and ESXi650-202210101-SG for version 6.5. No workarounds are available, making patch installation the only mitigation option (VMware Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."