Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cwr2-2v2q-jq6q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.

EPSS

Процентиль: 32%
0.00127
Низкий

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 7.4
nvd
больше 5 лет назад

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость интерфейса управления средства управления виртуальной инфраструктурой VMware vCenter Server, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации

EPSS

Процентиль: 32%
0.00127
Низкий

Дефекты

CWE-295