cve-2019-5531
Vulnerability from cvelistv5
Published
2019-09-18 21:42
Modified
2024-08-04 20:01
Severity ?
Summary
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:01:51.896Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware vSphere ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 prior to ESXi670-201810101-SG"
            },
            {
              "status": "affected",
              "version": "6.5 prior to ESXi650-201811102-SG"
            },
            {
              "status": "affected",
              "version": "6.0 prior to ESXi600-201807103-SG"
            }
          ]
        },
        {
          "product": "VMware vCenter Server",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 prior to 6.7 U1b"
            },
            {
              "status": "affected",
              "version": "6.5 prior to 6.5 U2b"
            },
            {
              "status": "affected",
              "version": "6.0 prior to 6.0 U3j"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information disclosure vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-20T18:18:52",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2019-5531",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware vSphere ESXi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 prior to ESXi670-201810101-SG"
                          },
                          {
                            "version_value": "6.5 prior to ESXi650-201811102-SG"
                          },
                          {
                            "version_value": "6.0 prior to ESXi600-201807103-SG"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "VMware vCenter Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 prior to 6.7 U1b"
                          },
                          {
                            "version_value": "6.5 prior to 6.5 U2b"
                          },
                          {
                            "version_value": "6.0 prior to 6.0 U3j"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information disclosure vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2019-5531",
    "datePublished": "2019-09-18T21:42:17",
    "dateReserved": "2019-01-07T00:00:00",
    "dateUpdated": "2024-08-04T20:01:51.896Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-5531\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2019-09-18T22:15:11.357\",\"lastModified\":\"2020-02-10T21:53:17.333\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.\"},{\"lang\":\"es\",\"value\":\"VMware vSphere ESXi (6.7 anterior a la versi\u00f3n ESXi670-201810101-SG, 6.5 anterior a la versi\u00f3n  ESXi650-201811102-SG y 6.0 anterior a la veris\u00f3n ESXi600-201807103-SG) y VMware vCenter Server (6.7 anterior a 6.7 U1b, 6.5 anterior de 6.5 U2b, y 6.0 anterior a 6.0 U3j) contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en clientes que surge de una caducidad de sesi\u00f3n insuficiente. Un atacante con acceso f\u00edsico o la capacidad de imitar una conexi\u00f3n websocket al navegador de un usuario puede obtener el control de una consola VM despu\u00e9s de que el usuario haya cerrado sesi\u00f3n o su sesi\u00f3n haya caducado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-613\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE65721-57C0-4748-B159-F6D97CE8CAB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F86FE1-8540-4C89-990E-FE397E2E56C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.7:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"98469327-DCED-47A0-BE32-54FD6C458329\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vsphere_esxi:6.5:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9649FA-E181-426F-A7CD-A7DA407FD60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vsphere_esxi:6.5:u2:*:*:*:*:*:*\",\"matchCriteriaId\":\"172B6B61-9005-4629-8583-7EEC630BF75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B998A9-208A-41F7-B981-2FA7ABF1E9F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BDCA59-38C7-4E8C-89D1-8CD2F432F106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E77CCBC-B104-4A88-90CF-57DC126CC448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811002:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F151754-8E39-42FC-B853-A8CEA25FA614\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*\",\"matchCriteriaId\":\"726C9EF2-7AFB-410A-8EDC-49DCB113AF30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*\",\"matchCriteriaId\":\"770D4FA0-4ACC-44F4-96D4-04471DB07118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61873BB-E6F3-4240-B71B-589BD5D3AFBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.5:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43516B10-6F39-45D2-B9A8-1FF8C1633132\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2FC4AF4-9D52-4FB7-803C-6CD3815FFB27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201810001:*:*:*:*:*:*\",\"matchCriteriaId\":\"7032617B-E855-4DB1-8A7E-AFC716399B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201811001:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6CD3CEF-1230-4CF4-BD66-74690DBD763C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201903001:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6792B87-53C4-42FB-B72B-8FD980B1FE9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201905001:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC892F4-2413-41B1-9EFF-6E40FDAEF9AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B128C5-926E-4507-9268-E1C776713AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:u1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F8F18E-FFEE-44A4-8D0F-D1F098D94D75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:u1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"967DA5A9-6A83-4F56-BB63-52D31256A848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:u3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8916F0-EE48-495F-A698-EF9264F7E34A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"21634E09-E32A-4E38-95FE-8E26EFD85557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:vsphere_esxi:6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"22219B28-4974-449B-A79E-CBBDC16C3131\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7499E57A-1F9C-45F0-93F8-F3FB7B0F990F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"74EE8EE5-54F0-4359-898B-C57C5B2AE7C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83AAB8E-F129-4D1C-A4BC-4CC2C1777F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C914E1AB-DF4F-4A68-8893-EDA57E048147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ECFC0C8-C8EC-4E44-9E90-5D4C67B5F339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:u3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E2BAD93-38DE-4C23-8953-4E199996537B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8838067B-0AB5-4C6A-B201-73C193FEFA92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"34EDDB03-6DA9-48FE-B7F2-FBBCDF5D8385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8C89BF-93F3-419A-83B7-B617A3DF31D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E38D9BC-1BFA-45B5-AC25-A6DB3F025D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F803DFB-4172-4D60-94DE-F20370859617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99ACFA4-3EEF-4151-80E9-701537DB8D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4591535-4081-4DF7-B115-53D1014C83CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*\",\"matchCriteriaId\":\"22C17858-6EBB-4807-A230-3F53670A69FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A98613-F61B-4801-840E-6F281A98B381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0122FA8-0D5F-4296-B00B-9BA00CBAE64D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F6CA9D-16DB-450B-A226-93FC151AB631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*\",\"matchCriteriaId\":\"D441FEB9-5773-4E20-9B3E-B6F634F773E9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF33103-ECDD-427B-A445-2D7F90202FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"5241C282-A02B-44B2-B6CA-BA3A99F9737C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A60AC7-C2EA-4DBF-9743-54D708584AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"445FA649-B7F4-4AE2-A487-57357AC95241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A91B0C4-F184-459E-AFD3-DE0E351CC964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"23253631-2655-48A8-9B00-CB984232329C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C2A9A8-0E66-4702-BCD4-74622108E7A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE4D3E2A-C32D-408F-B811-EF8BC86F0D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CA7802-D78D-4BAD-A45A-68B601C010C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B98981B-4721-4752-BAB4-361DB5AEB86F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D97854C-DE5D-48B4-B5DB-C132E6D4B826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF7DDB0C-3C07-4B5E-8B8A-0542FEE72877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DD16169-A7DF-4604-888C-156A60018E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FC9F34-C8FA-4AFE-9F4A-7CF9516BD4D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26534EB-327B-4ED6-A3E1-005552CB1F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E51F433-1152-4E94-AF77-970230B1A574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"0064D104-E0D8-481A-9029-D3726A1A9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B4D3F61-6CD9-411F-A205-EB06A57EBB4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72A1E9C-F960-4E8C-A46C-B38209E6349E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C33CE46-F529-4EA9-9344-6ED3BFA7019D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F1D8161-0E02-45C9-BF61-14799AB65E03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2CB1FF-6118-4875-945D-07BAA3A21FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEDA28A-5C8E-4E95-A377-3BE530DBEAB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDDC6510-3116-4578-80C8-8EF044A8370A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*\",\"matchCriteriaId\":\"8678DB48-CB98-4E4C-ADE6-CABA73265FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD9A341-1FBF-4E04-848B-550DEB27261A\"}]}]}],\"references\":[{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2019-0013.html\",\"source\":\"security@vmware.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.