VMware vSphere Data Protection Private SSH Key Authentication Bypass (VMSA-2016-0024)

Critical Nessus Plugin ID 96338


A virtualization appliance installed on the remote host is affected by an authentication bypass vulnerability.


The version of VMware vSphere Data Protection installed on the remote host is 5.5.x / 5.8.x / 6.0.x / 6.1.x. It is, therefore, affected by an authentication bypass vulnerability due to the use of an SSH private key that has a known password and which is configured to allow key-based authentication. A remote attacker can exploit this to gain root login access via an SSH session.


Apply the appropriate patch according to the vendor advisory.

See Also



Plugin Details

Severity: Critical

ID: 96338

File Name: vmware_VMSA-2016-0024.nasl

Version: 1.12

Type: local

Family: Misc.

Published: 2017/01/09

Updated: 2019/11/13

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vsphere_data_protection

Required KB Items: Host/vSphere Data Protection/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/12/20

Vulnerability Publication Date: 2016/12/20

Exploitable With

Metasploit (VMware VDP Known SSH Key)

Reference Information

CVE: CVE-2016-7456

BID: 94990

VMSA: 2015-0024