Severity | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE ID | CVE-2016-7458 |
CVSSv3 |
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C] |
CWE ID | CWE-611 |
Exploitation vector | Network |
Public exploit | Not available |
Vulnerable software |
vSphere Client |
Vulnerable software versions |
vSphere Client 5.5 U3d vSphere Client 5.5 U3c vSphere Client 5.5 U3b Show more |
Vendor URL | VMware, Inc |
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to incorrect handling of XML requests. A remote attacker can trick the victim to connect to malicious vCenter Server or ESXi server, send to client specially crafted XML External Entity (XXE) data and obtain potentially sensitive information from victim's system.
Successful exploitation of the vulnerability may allow an attacker to obtain potentially sensitive information.
Remediation
The vulnerability is fixed in vSphere Client 5.5 U3e and 6.0 U2a.
Note: in order to remediate the vulnerability, the vSphere Client should be reinstalled.
External linkshttp://www.vmware.com/security/advisories/VMSA-2016-0022.html