Vulnerability Description
VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Xenon | >= 1.0.0, <= 1.5.3 |
Related Weaknesses (CWE)
References
- http://seclists.org/oss-sec/2018/q1/153Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/103093Third Party AdvisoryVDB Entry
- https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21cPatchThird Party Advisory
- https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0aPatchThird Party Advisory
- https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3PatchThird Party Advisory
- http://seclists.org/oss-sec/2018/q1/153Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/103093Third Party AdvisoryVDB Entry
- https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1PatchThird Party Advisory
- https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592PatchThird Party Advisory
FAQ
What is CVE-2017-4952?
CVE-2017-4952 is a vulnerability with a CVSS score of 7.5 (HIGH). VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access...
How severe is CVE-2017-4952?
CVE-2017-4952 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-4952?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Xenon.