First published: Fri Jul 28 2017(Updated: )
VMware vCenter Server 5.5, 6.0, 6.5 allows vSphere users with certain, limited vSphere privileges to use the VIX API to access Guest Operating Systems without the need to authenticate.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | =5.5 | |
VMware vCenter | =6.0 | |
VMware vCenter | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4919 has been assigned a medium severity rating, indicating a moderate risk for vCenter Server users.
To mitigate CVE-2017-4919, it is recommended to upgrade to a fixed version of VMware vCenter Server that addresses this vulnerability.
CVE-2017-4919 affects VMware vCenter Server versions 5.5, 6.0, and 6.5.
CVE-2017-4919 allows users with limited privileges to exploit the VIX API to access Guest Operating Systems without authentication.
There are no official workarounds for CVE-2017-4919; upgrading to a non-vulnerable version is the recommended approach.