VMSA-2020-0008 : VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability

critical Nessus Plugin ID 136174


The remote VMware ESXi host is missing a security-related patch.


a. VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability (CVE-2020-3955)

Description :
The VMware ESXi Host Client does not properly neutralize script-related HTML when viewing virtual machines attributes.

A malicious actor with access to modify the system properties of a virtual machine from inside the guest os (such as changing the hostname of the virtual machine) may be able to inject malicious script which will be executed by a victim's browser when viewing this virtual machine via the ESXi Host Client.


Apply the missing patch.

See Also


Plugin Details

Severity: Critical

ID: 136174

File Name: vmware_VMSA-2020-0008.nasl

Version: 1.5

Type: local

Published: 4/30/2020

Updated: 8/28/2020

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.3


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2020-3955


Risk Factor: Critical

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi:6.5, cpe:/o:vmware:esxi:6.7

Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/28/2020

Vulnerability Publication Date: 4/29/2020

Reference Information

CVE: CVE-2020-3955

IAVA: 2020-A-0193-S

VMSA: 2020-0008