HIGH · 7.6

CVE-2016-2076

Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles sess...

Vulnerability Description

Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.

CVSS Score

7.6

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
VmwareVcenter Server<= 6.0
VmwareVcloud Automation Identity Appliance6.2.4
VmwareVcloud Director5.5.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-2076?

CVE-2016-2076 is a vulnerability with a CVSS score of 7.6 (HIGH). Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles sess...

How severe is CVE-2016-2076?

CVE-2016-2076 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-2076?

Check the references section above for vendor advisories and patch information. Affected products include: Vmware Vcenter Server, Vmware Vcloud Automation Identity Appliance, Vmware Vcloud Director.