VMware vCenter 6.0 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006)

medium Nessus Plugin ID 86125

Synopsis

The remote host has a virtualization management application installed that is affected by a man-in-the-middle spoofing vulnerability.

Description

The VMware vCenter Server installed on the remote host is version 6.0 prior to 6.0u1. It is, therefore, affected by a man-in-the-middle spoofing vulnerability due to improper validation of X.509 certificates from TLS LDAP servers. A remote, man-in-the-middle attacker can exploit this to intercept network traffic by spoofing a TLS server via a crafted certificate, resulting in the manipulation or disclosure of sensitive information.

Solution

Upgrade to VMware vCenter Server 6.0u1 (6.0.0 build-3018521) or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2015-0006.html

Plugin Details

Severity: Medium

ID: 86125

File Name: vmware_vcenter_vmsa-2015-0006_60.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 9/24/2015

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/release, Host/VMware/version, Host/VMware/vCenter

Exploit Ease: No known exploits are available

Patch Publication Date: 9/16/2015

Vulnerability Publication Date: 9/16/2015

Reference Information

CVE: CVE-2015-6932

VMSA: 2015-0006