CVE-2019-6175

Vulnerability updated 4 months ago (2024-05-04T17:12:15.310Z)
Download STIX
Preview STIX
CVE-2019-6175 is a vulnerability that was discovered in February 2019. It affects multiple versions of the VMware vSphere ESXi hypervisor, which is used to create and manage virtual machines. The vulnerability allows an attacker with network access to the management interface of the affected system to execute arbitrary code on the host machine. This could lead to a complete compromise of the virtual environment and potentially allow an attacker to gain control of other systems on the network. The vulnerability was rated as critical and assigned a CVSS score of 9.8 out of 10 by the National Vulnerability Database. VMware released patches for the vulnerability shortly after it was discovered, but it is important for organizations using affected versions of the software to apply the patch as soon as possible to prevent exploitation. The discovery of the CVE-2019-6175 vulnerability highlights the importance of regular software updates and vulnerability management practices. Organizations should conduct vulnerability scans and assessments on a regular basis, prioritize high-risk vulnerabilities for remediation, and monitor for suspicious activity on their networks to detect and respond to potential attacks.
Description last updated: 2023-06-19T06:07:27.311Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2019-6175 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
Close Quarters Encounters with Third Generation Malware Compels UK and Danish Municipalities to Remodel Vulnerability Management Safeguards