5.8

CVE-2019-5531

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VMwareESXi Version6.7 Update670-201811001
VMwareVsphere Esxi Version6.7
VMwareVsphere Esxi Version6.7 Updateupdate_1
VMwareVsphere Esxi Version6.5 Updatea
VMwareVsphere Esxi Version6.5 Updateu2
VMwareVsphere Esxi Version6.5
VMwareVsphere Esxi Version6.5 Update650-201810002
VMwareVsphere Esxi Version6.5 Update650-201811001
VMwareVsphere Esxi Version6.5 Update650-201811002
VMwareVsphere Esxi Version6.5 Update650-201901001
VMwareVsphere Esxi Version6.5 Update650-201903001
VMwareVsphere Esxi Version6.5 Update650-201905001
VMwareVsphere Esxi Version6.5 Updateupdate_1
VMwareVsphere Esxi Version6.0
VMwareVsphere Esxi Version6.0 Update600-201810001
VMwareVsphere Esxi Version6.0 Update600-201811001
VMwareVsphere Esxi Version6.0 Update600-201903001
VMwareVsphere Esxi Version6.0 Update600-201905001
VMwareVsphere Esxi Version6.0 Updatebeta
VMwareVsphere Esxi Version6.0 Updateu1a
VMwareVsphere Esxi Version6.0 Updateu1b
VMwareVsphere Esxi Version6.0 Updateu3a
VMwareVsphere Esxi Version6.0 Updateupdate_2
VMwareVsphere Esxi Version6.0 Updateupdate_3
VMwareVcenter Server Version6.0
VMwareVcenter Server Version6.0 Updatea
VMwareVcenter Server Version6.0 Updateb
VMwareVcenter Server Version6.0 Updateu1
VMwareVcenter Server Version6.0 Updateu1b
VMwareVcenter Server Version6.0 Updateu3
VMwareVcenter Server Version6.0 Updateupdate2
VMwareVcenter Server Version6.0 Updateupdate2a
VMwareVcenter Server Version6.0 Updateupdate2m
VMwareVcenter Server Version6.0 Updateupdate3a
VMwareVcenter Server Version6.0 Updateupdate3b
VMwareVcenter Server Version6.0 Updateupdate3c
VMwareVcenter Server Version6.0 Updateupdate3d
VMwareVcenter Server Version6.0 Updateupdate3e
VMwareVcenter Server Version6.0 Updateupdate3f
VMwareVcenter Server Version6.0 Updateupdate3g
VMwareVcenter Server Version6.0 Updateupdate3h
VMwareVcenter Server Version6.0 Updateupdate3i
VMwareVcenter Server Version6.7
VMwareVcenter Server Version6.7 Updatea
VMwareVcenter Server Version6.7 Updateb
VMwareVcenter Server Version6.7 Updatec
VMwareVcenter Server Version6.7 Updated
VMwareVcenter Server Version6.7 Updateupdate1
VMwareVcenter Server Version6.7 Updateupdate1b
VMwareVcenter Server Version6.7 Updateupdate2
VMwareVcenter Server Version6.7 Updateupdate2a
VMwareVcenter Server Version6.7 Updateupdate2c
VMwareVcenter Server Version6.5
VMwareVcenter Server Version6.5 Updatea
VMwareVcenter Server Version6.5 Updateb
VMwareVcenter Server Version6.5 Updatec
VMwareVcenter Server Version6.5 Updated
VMwareVcenter Server Version6.5 Updateupdate1
VMwareVcenter Server Version6.5 Updateupdate1b
VMwareVcenter Server Version6.5 Updateupdate1c
VMwareVcenter Server Version6.5 Updateupdate1d
VMwareVcenter Server Version6.5 Updateupdate1e
VMwareVcenter Server Version6.5 Updateupdate1g
VMwareVcenter Server Version6.5 Updateupdate2
VMwareVcenter Server Version6.5 Updateupdate2b
VMwareVcenter Server Version6.5 Updateupdate2c
VMwareVcenter Server Version6.5 Updateupdate2d
VMwareVcenter Server Version6.5 Updateupdate2g
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.75% 0.722
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.8 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."