Vulnerability identifier: #VU41033
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-310
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
vCenter Server Appliance
Client/Desktop applications /
Virtualization software
Vendor: VMware, Inc
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
VMware vCenter Server Appliance (vCSA) 5.5 before Update 2, 5.1 before Update 3, and 5.0 before Update 3c does not properly validate certificates when connecting to a CIM Server on an ESXi host, which allows man-in-the-middle attackers to spoof CIM servers via a crafted certificate.
Mitigation
Install update from vendor's website.
Vulnerable software versions
vCenter Server Appliance: 5.0 - 5.5
External links
https://seclists.org/fulldisclosure/2014/Dec/23
https://www.securityfocus.com/archive/1/534161/100/0/threaded
https://www.vmware.com/security/advisories/VMSA-2014-0012.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.