CVE-2020-4005

7.8 HIGH
Published: November 20, 2020 Modified: October 31, 2025

Description

VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2020-0026.html
Source: security@vmware.com
Patch Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2020-0026.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

2 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.2%
44th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

vmware