Vulnerability Details : CVE-2022-22948
The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2022-22948
Probability of exploitation activity in the next 30 days: 1.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-22948
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2022-22948
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-22948
-
https://www.vmware.com/security/advisories/VMSA-2022-0009.html
VMSA-2022-0009Patch;Vendor Advisory
Products affected by CVE-2022-22948
- cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3n:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3o:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*
- cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:cloud_foundation:3.11:*:*:*:*:*:*:*