| Vulnerability Name: | CVE-2016-2076 (CCN-112364) | ||||||||||||
| Assigned: | 2016-04-14 | ||||||||||||
| Published: | 2016-04-14 | ||||||||||||
| Updated: | 2018-10-30 | ||||||||||||
| Summary: | Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site. | ||||||||||||
| CVSS v3 Severity: | 7.6 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L) 6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-287 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-2076 Source: SECTRACK Type: Third Party Advisory 1035570 Source: SECTRACK Type: Third Party Advisory 1035571 Source: SECTRACK Type: Third Party Advisory 1035572 Source: CCN Type: VMware Security Advisory VMSA-2016-0004 VMware product updates address a critical security issue in the VMware Client Integration Plugin Source: CONFIRM Type: Vendor Advisory http://www.vmware.com/security/advisories/VMSA-2016-0004.html Source: XF Type: UNKNOWN vmware-cve20162076-session-hijacking(112364) | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||