Warning: Actively exploited VMware vulnerabilities
CVE-2020-3992 - CVSS.V3 - 9.8
CVE-2019-5544 - CVSS.V3 - 9.8
These vulnerabilities could allow remote attackers to execute arbitrary code on affected installations of VMware ESXi. No kind of authentication is required to exploit those vulnerabilities.
The vulnerabilities could be exploited by remote attackers to compromise systems running VMware ESXi and execute arbitrary code on them. No level of authentication is required.
The specific flaw exists within the processing of SLP messages. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the SLP daemon.
CERT.be recommends to System administrators to install the latest updates released by the vendor for the affected versions: https://www.vmware.com/security/advisories/VMSA-2020-0023.html & www.vmware.com/security/advisories/VMSA-2019-0022.html.