Vulnerability Name:

CVE-2015-2342

Assigned:2015-10-01
Published:2015-10-01
Updated:2018-08-11
Summary:The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.
CVSS v3 Severity:7.3 High (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
6.4 Medium (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
References:Source: FULLDISC
Type: UNKNOWN
20151001 CVE-2015-2342 VMware vCenter Remote Code Execution

Source: BID
Type: UNKNOWN
76930

Source: SECTRACK
Type: UNKNOWN
1033720

Source: CONFIRM
Type: VENDOR_ADVISORY
http://www.vmware.com/security/advisories/VMSA-2015-0007.html

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-15-455

Source: XF
Type: UNKNOWN
vmware-vcenter-cve20152342-code-exec(106873)

Source: MISC
Type: UNKNOWN
https://www.7elements.co.uk/resources/technical-advisories/cve-2015-2342-vmware-vcenter-remote-code-execution/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vcenter_server:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vcenter_server:5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vcenter_server:5.5:update_2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware vcenter server 5.0
    vmware vcenter server 5.1
    vmware vcenter server 5.5
    vmware vcenter server 6.0
    vmware vcenter server 5.0
    vmware vcenter server 5.5 update_2