VMware vCenter 6.0 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006)

Medium Nessus Plugin ID 86125


The remote host has a virtualization management application installed that is affected by a man-in-the-middle spoofing vulnerability.


The VMware vCenter Server installed on the remote host is version 6.0 prior to 6.0u1. It is, therefore, affected by a man-in-the-middle spoofing vulnerability due to improper validation of X.509 certificates from TLS LDAP servers. A remote, man-in-the-middle attacker can exploit this to intercept network traffic by spoofing a TLS server via a crafted certificate, resulting in the manipulation or disclosure of sensitive information.


Upgrade to VMware vCenter Server 6.0u1 (6.0.0 build-3018521) or later.

See Also


Plugin Details

Severity: Medium

ID: 86125

File Name: vmware_vcenter_vmsa-2015-0006_60.nasl

Version: $Revision: 1.5 $

Type: remote

Family: Misc.

Published: 2015/09/24

Modified: 2016/04/24

Dependencies: 63061

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/vCenter, Host/VMware/version, Host/VMware/release

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/09/16

Vulnerability Publication Date: 2015/09/16

Reference Information

CVE: CVE-2015-6932

OSVDB: 127696

VMSA: 2015-0006