First published: Mon Apr 01 2019(Updated: )
VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCloud Director | >=9.5.0.0<9.5.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5523 is a Remote Session Hijack vulnerability in VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update.
CVE-2019-5523 has a severity rating of 9.8 (critical).
CVE-2019-5523 affects VMware vCloud Director versions 9.5.x prior to 9.5.0.3.
CVE-2019-5523 can be exploited by a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged-in user.
To fix CVE-2019-5523, update VMware vCloud Director to version 9.5.0.3 or later.