First published: Fri Apr 15 2016(Updated: )
Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | <=6.0 | |
VMware vCenter | =5.5-3a | |
VMware vCenter | =5.5-3b | |
VMware vCenter | =5.5-u3c | |
VMware vCloud Automation Identity Appliance | =6.2.4 | |
VMware vCloud Director | =5.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2076 is rated as a high-severity vulnerability due to its potential for allowing remote session hijacking.
To mitigate CVE-2016-2076, users should upgrade VMware vCenter Server, vCloud Director, and vRealize Automation Identity Appliance to the latest patched versions.
CVE-2016-2076 affects VMware vCenter Server versions 5.5 U3a, U3b, and U3c, vCloud Director 5.5.5, and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1.
CVE-2016-2076 can be exploited through crafted websites that facilitate session hijacking of affected VMware products.
Currently, applying the available patches is the recommended approach to address CVE-2016-2076, as there are no known effective workarounds.