This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of VMware vCenter Server. Authentication is not required to exploit this vulnerability. The specific flaw exists in the configuration of the JMX remote interface. This interface allows a remote attacker to register attacker-controlled mbeans. This vulnerability can be leveraged by an attacker to gain remote code execution under the context of SYSTEM.
VMware vCenter Server Patch Reissue
VMSA-2015-0007 : VMware vCenter and ESXi updates address critical security issues
VMSA-2015-0007: VMware ESXi OpenSLP Remote Code Execution (remote check)