First published: Sun Feb 01 2015(Updated: )
VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 and the proxy client in EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x do not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certificate.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vSphere Data Protection | =5.1 | |
VMware vSphere Data Protection | =5.5.1 | |
VMware vSphere Data Protection | =5.5.6 | |
VMware vSphere Data Protection | =5.5.7 | |
VMware vSphere Data Protection | =5.5.8 | |
VMware vSphere Data Protection | =5.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4632 is rated as a critical vulnerability due to potential exposure to man-in-the-middle attacks.
To fix CVE-2014-4632, upgrade to VMware vSphere Data Protection versions 5.5.9 or 5.8.1 or later.
CVE-2014-4632 affects VMware vSphere Data Protection versions 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1.
Yes, CVE-2014-4632 also affects EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) versions 6.x and 7.0.x.
CVE-2014-4632 enables man-in-the-middle attacks due to improper verification of X.509 certificates.