VMware NSX and vCNS product updates address a critical information disclosure vulnerability
VMware Security Advisory
VMware NSX and vCNS product updates address a critical information disclosure vulnerability.
2. Relevant Releases
NSX 6.2 prior to 6.2.3
NSX 6.1 prior to 6.1.7
vCNS 5.5.4 prior to 188.8.131.52
3. Problem Description
a. VMware NSX and vCNS critical information disclosure vulnerability
VMware NSX and vCNS with SSL-VPN enabled contain a critical input validation vulnerability. This issue may allow a remote attacker to gain access to sensitive information.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-2079 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Replace with/ Apply Patch
* Note: NSX Edge 6.2.3 which addresses CVE-2016-2079 is no longer available for download. NSX Edge 6.2.x customers that use SSL-VPN are advised to contact VMware support to request immediate assistance.
To contact VMware support, see VMware Knowledge Base article 2006985 or visit
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware NSX Downloads:
6. Change log
Initial security advisory in conjunction with the release of VMware NSX 6.2.3, 6.1.7 and vCNS 184.108.40.206 on 2016-06-09.
Updated security advisory to reflect that NSX Edge 6.2.x customers that use SSL-VPN are advised to contact VMware support.
Created on August 15, 2016 by Rick Scherer
Posted under Alert.
This blog has 1,029 views.