CVSS Score of 10 (low)


Published Oct 3, 2023
Updated: Oct 5, 2023


CVE-2023-36628 is a vulnerability that affects the VASA (vSphere APIs for Storage Awareness) component. This flaw allows users with access to a vSphere/ESXi VMware admin on a FlashArray to gain root access through privilege escalation. The vulnerability has a high severity rating and a base score of 8.8 out of 10. It requires low privileges to exploit and does not require user interaction. The attack vector is through the network, and the impact includes high integrity and confidentiality impacts. The affected products include nKx8Qa, vpkgct, nKx8Qb, nKx8QY, nKx8QZ, nKx8QW, nKx8QX, and nKx8QV. To remediate the vulnerability, it is recommended to apply the necessary security patches provided by the vendor. As this vulnerability poses a potential risk of unauthorized access and control over the affected systems, organizations should prioritize patching to prevent potential exploitation and protect their data and infrastructure.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-36628 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options