VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 and the proxy client in EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x do not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certificate.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-4558 VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 and the proxy client in EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x do not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certificate.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-06T11:20:26.670Z

Reserved: 2014-06-24T00:00:00

Link: CVE-2014-4632

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-02-01T02:59:00.050

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-4632

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.