VMware ESXi Multiple OpenSSL Vulnerabilities (VMSA-2014-0004) (Heartbleed)

Medium Nessus Plugin ID 87676

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.5


The remote VMware ESXi host is missing a security-related patch.


The remote VMware ESXi host is affected by multiple vulnerabilities in the OpenSSL third-party library :

- A flaw exist in the Elliptic Curve Digital Signature Algorithm (ECDSA) implementation due to a failure to insure that certain swap operations have a constant-time behavior. An attacker can exploit this to obtain the ECDSA nonces by using a FLUSH+RELOAD cache side-channel attack. (CVE-2014-0076)

- An out-of-bounds read error, known as Heartbleed, exists in the TLS/DTLS implementation due to improper handling of TLS heartbeat extension packets. A remote attacker, using crafted packets, can trigger a buffer over-read, resulting in the disclosure of up to 64KB of process memory, which contains sensitive information such as primary key material, secondary key material, and other protected content. (CVE-2014-0160)


Apply the appropriate patch according to the vendor advisory that pertains to ESXi version 5.5 / 5.5 U1. Additional remediation steps may also need to be performed after applying the patch.

See Also






Plugin Details

Severity: Medium

ID: 87676

File Name: vmware_VMSA-2014-0004_remote.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 2015/12/30

Updated: 2021/01/06

Dependencies: 57396

Risk Information

Risk Factor: Medium

VPR Score: 7.5

CVSS Score Source: CVE-2014-0160

CVSS v2.0

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.5

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/04/23

Vulnerability Publication Date: 2014/02/24

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0076, CVE-2014-0160

BID: 66363, 66690

VMSA: 2014-0004

CERT: 720951

EDB-ID: 32745, 32764, 32791, 32998