First published: Thu Dec 29 2016(Updated: )
VMware Identity Manager 2.x before 2.7.1 and vRealize Automation 7.x before 7.2.0 allow remote attackers to read /SAAS/WEB-INF and /SAAS/META-INF files via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Identity Manager | >=2.0<2.7.1 | |
VMware vRealize Automation | >=7.0<7.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5334 has been classified as a moderate severity vulnerability due to potential exposure of sensitive files.
To fix CVE-2016-5334, upgrade VMware Identity Manager to version 2.7.1 or vRealize Automation to version 7.2.0 or later.
The potential impacts of CVE-2016-5334 include unauthorized access to internal configuration files, which could lead to further attacks.
CVE-2016-5334 affects VMware Identity Manager versions before 2.7.1 and vRealize Automation versions before 7.2.0.
Yes, CVE-2016-5334 can be exploited remotely by attackers to read sensitive files if the proper security controls are not in place.