VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: vmware
Published: 2020-10-20T16:14:24
Updated: 2020-10-20T16:14:24
Reserved: 2019-12-30T00:00:00
Link: CVE-2020-3994
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-10-20T17:15:12.967
Modified: 2021-08-24T10:44:27.733
Link: CVE-2020-3994
JSON object: View
Redhat Information
No data.
CWE