Description
VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-25259 | VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates. |
References
History
No history.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-04T07:52:20.505Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2020-3994
No data.
Status : Modified
Published: 2020-10-20T17:15:12.967
Modified: 2024-11-21T05:32:07.787
Link: CVE-2020-3994
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD