Vulnerability Description
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Esxi | 6.7 |
| Vmware | Vsphere Esxi | 6.7 |
| Vmware | Vcenter Server | 6.0 |
Related Weaknesses (CWE)
References
- http://www.vmware.com/security/advisories/VMSA-2019-0013.html
- http://www.vmware.com/security/advisories/VMSA-2019-0013.html
FAQ
What is CVE-2019-5531?
CVE-2019-5531 is a vulnerability with a CVSS score of 5.4 (MEDIUM). VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b,...
How severe is CVE-2019-5531?
CVE-2019-5531 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5531?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Esxi, Vmware Vsphere Esxi, Vmware Vcenter Server.