This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The remote host has a virtualization management application installed
that is affected by a man-in-the-middle spoofing vulnerability.
The VMware vCenter Server installed on the remote host is version 6.0
prior to 6.0u1. It is, therefore, affected by a man-in-the-middle
spoofing vulnerability due to improper validation of X.509
certificates from TLS LDAP servers. A remote, man-in-the-middle
attacker can exploit this to intercept network traffic by spoofing a
TLS server via a crafted certificate, resulting in the manipulation or
disclosure of sensitive information.
See also :
Upgrade to VMware vCenter Server 6.0u1 (6.0.0 build-3018521) or later.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.3
Public Exploit Available : false