Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-5531

Опубликовано: 18 сент. 2019
Источник: nvd
CVSS3: 5.4
CVSS2: 5.8
EPSS Низкий

Описание

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.7:*:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.7:update_1:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:vmware:vsphere_esxi:6.5:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_esxi:6.5:u2:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811002:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.5:update_1:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:vmware:vsphere_esxi:6.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201810001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201811001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201903001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201905001:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:beta:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:u1a:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:u1b:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:u3a:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:update_2:*:*:*:*:*:*
cpe:2.3:o:vmware:vsphere_esxi:6.0:update_3:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:u3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*
Конфигурация 5

Одно из

cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
Конфигурация 6

Одно из

cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*

EPSS

Процентиль: 59%
0.00381
Низкий

5.4 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-613

Связанные уязвимости

github
больше 3 лет назад

VMware vSphere ESXi (6.7 prior to ESXi670-201904101-SG, 6.5 prior to ESXi650-201907101-SG, 6.0 prior to ESXi600-201909001) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user?s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

CVSS3: 5.4
fstec
больше 6 лет назад

Уязвимость средства управления виртуальной инфраструктурой VMware vCenter Server и гипервизора VMware ESXi, связанная с неверным сроком действия сеанса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 59%
0.00381
Низкий

5.4 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-613