CVE-2016-2079
Published Jul 3, 2016
Last updated 7 years ago
Overview
- Description
- VMware NSX Edge 6.1 before 6.1.7 and 6.2 before 6.2.3 and vCNS Edge 5.5 before 5.5.4.3, when the SSL-VPN feature is configured, allow remote attackers to obtain sensitive information via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E84A6BD4-C2A7-4B4E-8566-9E8116A83532" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAF8EF93-2571-430E-BCBE-394EF0B4897C" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1014FCA-713D-4667-8801-EE61BEA62D49" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0C2371A-F497-469E-BAA2-C47808D6B82D" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A2D6E92-4C93-4E6E-AC77-DBBE6765F986" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6A9306E-5F2E-4C78-A766-6B9168CF5043" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8B5DF0C-BE28-4CC3-84B9-0A3736889596" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3375D9F8-37F5-4C56-8E6C-3034C63CC4FA" }, { "criteria": "cpe:2.3:a:vmware:nsx_edge:6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74191A3C-A634-4081-A96A-C0695468B9A1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84A4801F-A077-47E2-B2AF-7BA89F834BF3" }, { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B6E788C-EC91-4E49-B5FE-FA92BB796ABF" }, { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9797BFE-CD1D-4217-9BE0-559E7C12E152" }, { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBD0B720-0C06-40D1-B8F6-F59E5DCCA463" }, { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFA66D20-1AFC-478A-B07F-E261537C426C" }, { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11EF3FE2-7A08-46E9-8DD6-B0A7AB5BA4B4" }, { "criteria": "cpe:2.3:a:vmware:vcloud_networking_and_security_edge:5.5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECA9A345-686B-4FCE-8562-1A181B4F0975" } ], "operator": "OR" } ] } ]