{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"VMware vIDM Connector version 3.3.3 pour Windows","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vIDM version 3.3.2 pour Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vIDM Connector version 3.3.1 pour Windows et Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vIDM version 3.3.1 pour Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vIDM Connector version 3.3.2 pour Windows et Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware Access version 20.10 pour Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vIDM version 3.3.3 pour Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware Access version 20.01 pour Linux","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware Cloud Foundation (vIDM) version 4.x","product":{"name":"Cloud Foundation","vendor":{"name":"VMware","scada":false}}},{"description":"vRealize Suite Lifecycle Manager (vIDM) version 8.x","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nA l'heure de r\u00e9daction de cet avis, l'\u00e9diteur n'a pas mis de correctif \u00e0\ndisposition. Le CERT-FR recommande de suivre la mise \u00e0 jour du bulletin\nde s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section\nDocumentation).\n\n## Contournement provisoire\n\nA l'heure de r\u00e9daction de cet avis, un contournement est recommand\u00e9 par\nl'\u00e9diteur (cf. section Documentation)\n","cves":[{"name":"CVE-2020-4006","url":"https://www.cve.org/CVERecord?id=CVE-2020-4006"}],"links":[],"reference":"CERTFR-2020-AVI-771","revisions":[{"description":"Version initiale","revision_date":"2020-11-24T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits VMware. Elle permet\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 dans les produits VMware","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0027 du 23 novembre 2020","url":"https://www.vmware.com/security/advisories/VMSA-2020-0027.html"}]}
