VMware vCenter Server 5.5.x < 5.5u3d / 6.0.x < 6.0u2 Client Integration Plugin Session Hijacking (VMSA-2016-0004)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

A virtualization management application installed on the remote host
is affected by a session hijacking vulnerability.

Description :

The version of VMware vCenter Server installed on the remote host is
5.5.x prior to 5.5u3d or 6.0.x prior to 6.0u2. It is, therefore,
affected by a flaw in the VMware Client Integration Plugin due to a
failure to handle session content in a secure manner. A remote
attacker can exploit this, by convincing a user to visit a malicious
web page, to conduct a session hijacking attack. It can also be
exploited to carry out a man-in-the-middle attack.

See also :

https://www.vmware.com/security/advisories/VMSA-2016-0004.html

Solution :

Upgrade to VMware vCenter Server version 5.5u3d (5.5.0 build-3721164)
/ 6.0u2 (6.0.0 build-3634788) or later.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 90710 ()

Bugtraq ID:

CVE ID: CVE-2016-2076

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now