VMware vCenter / vRealize Orchestrator 4.2.x / 5.x / 6.x Java Object Deserialization RCE (VMSA-2015-0009)

Critical Nessus Plugin ID 87763


The remote host has a virtualization application installed that is affected by a remote code execution vulnerability.


The version of VMware vCenter / vRealize Orchestrator installed on the remote host is 4.2.x, 5.x, or 6.x and includes the Apache Commons Collections (ACC) library version 3.2.1. It is, therefore, affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the ACC library. An unauthenticated, remote attacker can exploit this, by sending a crafted request, to execute arbitrary code on the target host.


Apply the patch referenced in VMware KB 2141244.

See Also






Plugin Details

Severity: Critical

ID: 87763

File Name: vmware_orchestrator_vmsa_2015_0009.nasl

Version: $Revision: 1.8 $

Type: local

Family: Misc.

Published: 2016/01/06

Modified: 2017/06/12

Dependencies: 78669

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_orchestrator, cpe:/a:vmware:vrealize_orchestrator

Required KB Items: installed_sw/VMware vCenter Orchestrator

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/12/18

Vulnerability Publication Date: 2015/01/28

Exploitable With


Reference Information

CVE: CVE-2015-6934

BID: 79648

OSVDB: 132090

VMSA: 2015-0009

IAVB: 2016-B-0006

CERT: 576313