First published: Mon Sep 15 2014(Updated: )
VMware NSX 6.0 before 6.0.6, and vCloud Networking and Security (vCNS) 5.1 before 5.1.4.2 and 5.5 before 5.5.3, does not properly validate input, which allows attackers to obtain sensitive information via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware NSX | =6.0 | |
VMware NSX | =6.0.1 | |
VMware NSX | =6.0.2 | |
VMware NSX | =6.0.3 | |
VMware NSX | =6.0.4 | |
VMware NSX | =6.0.5 | |
Vmware Vcloud Networking And Security | =5.1 | |
Vmware Vcloud Networking And Security | =5.1.1 | |
Vmware Vcloud Networking And Security | =5.1.2 | |
Vmware Vcloud Networking And Security | =5.1.3 | |
Vmware Vcloud Networking And Security | =5.1.4 | |
Vmware Vcloud Networking And Security | =5.1.4.1 | |
Vmware Vcloud Networking And Security | =5.5 | |
Vmware Vcloud Networking And Security | =5.5.0a | |
Vmware Vcloud Networking And Security | =5.5.1 | |
Vmware Vcloud Networking And Security | =5.5.2 | |
Vmware Vcloud Networking And Security | =5.5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3796 is rated as a medium severity vulnerability.
To fix CVE-2014-3796, upgrade to VMware NSX version 6.0.6 or later, or vCloud Networking and Security versions 5.1.4.2 or 5.5.3 or later.
CVE-2014-3796 affects VMware NSX 6.0 through 6.0.5 and vCloud Networking and Security versions 5.1 through 5.5.2.1.
Exploiting CVE-2014-3796 may allow attackers to obtain sensitive information.
There are no known workarounds for CVE-2014-3796, so it is recommended to apply the updates.