Vulnerability Description
The Single Sign-On feature in VMware vCenter Server 5.5 before U3e and 6.0 before U2a and vRealize Automation 6.x before 6.2.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Vrealize Automation | 6.0.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/94485Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037327
- http://www.securitytracker.com/id/1037329
- http://www.vmware.com/security/advisories/VMSA-2016-0022.htmlVendor Advisory
- http://www.securityfocus.com/bid/94485Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037327
- http://www.securitytracker.com/id/1037329
- http://www.vmware.com/security/advisories/VMSA-2016-0022.htmlVendor Advisory
FAQ
What is CVE-2016-7460?
CVE-2016-7460 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The Single Sign-On feature in VMware vCenter Server 5.5 before U3e and 6.0 before U2a and vRealize Automation 6.x before 6.2.5 allows remote attackers to read arbitrary files or cause a denial of serv...
How severe is CVE-2016-7460?
CVE-2016-7460 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-7460?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Vrealize Automation.