VMware vSphere Replication Oracle JRE JMX Deserialization RCE (VMSA-2016-0005)

critical Nessus Plugin ID 91457
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is a virtualization appliance that is affected by a remote code execution vulnerability.


The VMware vSphere Replication running on the remote host is version 5.6.x prior to, 5.8.x prior to, 6.0.x prior to, or 6.1.x prior to 6.1.1. It is, therefore, affected by a remote code execution vulnerability in the Oracle JRE JMX component due to a flaw related to the deserialization of authentication credentials. An unauthenticated, remote attacker can exploit this to execute arbitrary code.

Note that vSphere Replication is only affected if its vCloud Tunneling Agent is running, and it is not enabled by default.


Upgrade to VMware vSphere Replication version / / / 6.1.1 or later.

See Also


Plugin Details

Severity: Critical

ID: 91457

File Name: vmware_vsphere_replication_vmsa_2016_0005.nasl

Version: 1.12

Type: local

Family: Misc.

Published: 6/3/2016

Updated: 11/19/2019

Dependencies: ssh_get_info.nasl

Risk Information

CVSS Score Source: CVE-2016-3427


Risk Factor: High

Score: 8.1


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: Critical

Base Score: 9

Temporal Score: 7.8

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/a:vmware:vsphere_replication

Required KB Items: Host/VMware vSphere Replication/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 5/17/2016

Vulnerability Publication Date: 5/17/2016

Reference Information

CVE: CVE-2016-3427

VMSA: 2016-0005