CVE-2016-2076
Published Apr 15, 2016
Last updated 6 years ago
Overview
- Description
- Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.6
- Impact score
- 4.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server:*:1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAB3B893-E993-4DA0-BA88-2CA063FE4752", "versionEndIncluding": "6.0" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:5.5:3a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23D847E4-5869-476A-B85F-29D8D5FDB68D" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:5.5:3b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F8CC145-0D3F-4E42-BA46-403586EC608A" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:5.5:u3c:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C0AEA4D-0544-43B4-B0E7-8FA2459530A1" }, { "criteria": "cpe:2.3:a:vmware:vcloud_automation_identity_appliance:6.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E52DED3B-17F6-4FC9-B407-A466B1AA002C" }, { "criteria": "cpe:2.3:a:vmware:vcloud_director:5.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0606C081-EA52-4D6A-B033-9D3CB1C836FD" } ], "operator": "OR" } ] } ]