Lucene search

K
cve[email protected]CVE-2019-5531
HistorySep 18, 2019 - 10:15 p.m.

CVE-2019-5531

2019-09-1822:15:11
CWE-613
web.nvd.nist.gov
204
vmware
vsphere
esxi
vcenter
cve-2019-5531
vulnerability
information disclosure

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

6.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

33.8%

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

Affected configurations

NVD
Node
vmwareesxiMatch6.7670-201811001
OR
vmwarevsphere_esxiMatch6.7
OR
vmwarevsphere_esxiMatch6.7update_1
Node
vmwarevsphere_esxiMatch6.5a
OR
vmwarevsphere_esxiMatch6.5u2
OR
vmwarevsphere_esxiMatch6.5
OR
vmwarevsphere_esxiMatch6.5650-201810002
OR
vmwarevsphere_esxiMatch6.5650-201811001
OR
vmwarevsphere_esxiMatch6.5650-201811002
OR
vmwarevsphere_esxiMatch6.5650-201901001
OR
vmwarevsphere_esxiMatch6.5650-201903001
OR
vmwarevsphere_esxiMatch6.5650-201905001
OR
vmwarevsphere_esxiMatch6.5update_1
Node
vmwarevsphere_esxiMatch6.0
OR
vmwarevsphere_esxiMatch6.0600-201810001
OR
vmwarevsphere_esxiMatch6.0600-201811001
OR
vmwarevsphere_esxiMatch6.0600-201903001
OR
vmwarevsphere_esxiMatch6.0600-201905001
OR
vmwarevsphere_esxiMatch6.0beta
OR
vmwarevsphere_esxiMatch6.0u1a
OR
vmwarevsphere_esxiMatch6.0u1b
OR
vmwarevsphere_esxiMatch6.0u3a
OR
vmwarevsphere_esxiMatch6.0update_2
OR
vmwarevsphere_esxiMatch6.0update_3
Node
vmwarevcenter_serverMatch6.0
OR
vmwarevcenter_serverMatch6.0a
OR
vmwarevcenter_serverMatch6.0b
OR
vmwarevcenter_serverMatch6.0u1
OR
vmwarevcenter_serverMatch6.0u1b
OR
vmwarevcenter_serverMatch6.0u3
OR
vmwarevcenter_serverMatch6.0update2
OR
vmwarevcenter_serverMatch6.0update2a
OR
vmwarevcenter_serverMatch6.0update2m
OR
vmwarevcenter_serverMatch6.0update3a
OR
vmwarevcenter_serverMatch6.0update3b
OR
vmwarevcenter_serverMatch6.0update3c
OR
vmwarevcenter_serverMatch6.0update3d
OR
vmwarevcenter_serverMatch6.0update3e
OR
vmwarevcenter_serverMatch6.0update3f
OR
vmwarevcenter_serverMatch6.0update3g
OR
vmwarevcenter_serverMatch6.0update3h
OR
vmwarevcenter_serverMatch6.0update3i
Node
vmwarevcenter_serverMatch6.7
OR
vmwarevcenter_serverMatch6.7a
OR
vmwarevcenter_serverMatch6.7b
OR
vmwarevcenter_serverMatch6.7c
OR
vmwarevcenter_serverMatch6.7d
OR
vmwarevcenter_serverMatch6.7update1
OR
vmwarevcenter_serverMatch6.7update1b
OR
vmwarevcenter_serverMatch6.7update2
OR
vmwarevcenter_serverMatch6.7update2a
OR
vmwarevcenter_serverMatch6.7update2c
Node
vmwarevcenter_serverMatch6.5
OR
vmwarevcenter_serverMatch6.5a
OR
vmwarevcenter_serverMatch6.5b
OR
vmwarevcenter_serverMatch6.5c
OR
vmwarevcenter_serverMatch6.5d
OR
vmwarevcenter_serverMatch6.5update1
OR
vmwarevcenter_serverMatch6.5update1b
OR
vmwarevcenter_serverMatch6.5update1c
OR
vmwarevcenter_serverMatch6.5update1d
OR
vmwarevcenter_serverMatch6.5update1e
OR
vmwarevcenter_serverMatch6.5update1g
OR
vmwarevcenter_serverMatch6.5update2
OR
vmwarevcenter_serverMatch6.5update2b
OR
vmwarevcenter_serverMatch6.5update2c
OR
vmwarevcenter_serverMatch6.5update2d
OR
vmwarevcenter_serverMatch6.5update2g

CNA Affected

[
  {
    "product": "VMware vSphere ESXi",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "6.7 prior to ESXi670-201810101-SG"
      },
      {
        "status": "affected",
        "version": "6.5 prior to ESXi650-201811102-SG"
      },
      {
        "status": "affected",
        "version": "6.0 prior to ESXi600-201807103-SG"
      }
    ]
  },
  {
    "product": "VMware vCenter Server",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "6.7 prior to 6.7 U1b"
      },
      {
        "status": "affected",
        "version": "6.5 prior to 6.5 U2b"
      },
      {
        "status": "affected",
        "version": "6.0 prior to 6.0 U3j"
      }
    ]
  }
]

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

6.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

33.8%

Related for CVE-2019-5531