CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
EPSS
Percentile
50.9%
Vulnerable software
vSphere Client
Versions: 5.5, 6.0
Links:
http://www.vmware.com/
Severity level
Severity level: Medium
Impact: Information disclosure
Access Vector: Remote
CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE: CVE-2016-7458
Software description
vSphere Client is a software for VMware hypervisor or virtualization environment management.
Vulnerability description
The specialists of the Positive Research center have detected an XML External Entity Injection in vSphere Client.
Vulnerability in the vSphere Client allows attackers to obtain sensitive information by tricking a user to connect to a malicious vCenter Server or ESXi.
How to fix
Update your software up to the latest version
Advisory status
23.10.2015 - Vendor gets vulnerability details
22.11.2016 - Vendor releases fixed version and details
25.11.2016 - Public disclosure
Credits
The vulnerability was detected by Vladimir Ivanov, Andrey Evlanin, Mikhail Stepankin, Artem Kondratenko, Arseniy Sharoglazov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2016-30
http://www.vmware.com/security/advisories/VMSA-2016-0022.html
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com
<http://en.securitylab.ru/lab/>
About Positive Technologies
Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com
*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
EPSS
Percentile
50.9%