Vulnerability Name:

CVE-2017-4952 (CCN-139078)

Assigned:2016-12-26
Published:2018-02-13
Updated:2019-10-03
Summary:VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-732
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2017-4952

Source: CCN
Type: oss-sec Mailing List, Tue, 13 Feb 2018 20:39:25 +0000
Authentication Bypass Vulnerability in VMware Xenon (CVE-2017-4952)

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20180213 Authentication Bypass Vulnerability in VMware Xenon (CVE-2017-4952)

Source: BID
Type: Third Party Advisory, VDB Entry
103093

Source: CCN
Type: BID-103093
VMware Xenon CVE-2017-4952 Authentication Bypass Vulnerability

Source: XF
Type: UNKNOWN
vmware-xenon-cve20174952-sec-bypass(139078)

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a

Source: CCN
Type: Xenon GIT Repository
Add auth to UtilityService

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3

Source: CCN
Type: VMware Web site
Xenon

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:xenon:*:*:*:*:*:*:*:* (Version >= 1.0.0 and <= 1.5.3)
  • OR cpe:/a:vmware:xenon:1.1.0:cr0-3:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.1.0:cr3_1:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.3.7:cr1_2:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.4.2:cr4_1:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr2:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr3:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr4:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr5:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr6:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr6_1:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr6_2:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4:cr7:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.4_8:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:xenon:1.5.7_7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:xenon:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware xenon *
    vmware xenon 1.1.0 cr0-3
    vmware xenon 1.1.0 cr3_1
    vmware xenon 1.3.7 cr1_2
    vmware xenon 1.4.2 cr4_1
    vmware xenon 1.5.4 cr2
    vmware xenon 1.5.4 cr3
    vmware xenon 1.5.4 cr4
    vmware xenon 1.5.4 cr5
    vmware xenon 1.5.4 cr6
    vmware xenon 1.5.4 cr6_1
    vmware xenon 1.5.4 cr6_2
    vmware xenon 1.5.4 cr7
    vmware xenon 1.5.4_8
    vmware xenon 1.5.7_7
    vmware xenon *