ID CVE-2014-1210
Summary VMware vSphere Client 5.0 before Update 3 and 5.1 before Update 2 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:vsphere_client:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vsphere_client:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vsphere_client:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vsphere_client:5.1:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 14-04-2014 - 16:58)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
refmap via4
confirm http://www.vmware.com/security/advisories/VMSA-2014-0003.html
Last major update 14-04-2014 - 16:58
Published 11-04-2014 - 19:55
Last modified 14-04-2014 - 16:58
Back to Top