### [CVE-2023-20894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20894) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation%20(vCenter%20Server)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server%20(vCenter%20Server)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.x%3C%207.0%20U3m%2C%208.0%20U1b%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0%3C%208.0%20U1b%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption. ### POC #### Reference - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658 #### Github No PoCs found on GitHub currently.