VMware NSX and vCNS product updates address a critical information disclosure vulnerability
VMware NSX and vCNS product updates address a critical information disclosure vulnerability.
2. Relevant Releases
NSX 6.2 prior to 6.2.3
NSX 6.1 prior to 6.1.7
vCNS 5.5.4 prior to 220.127.116.11
3. Problem Description
a. VMware NSX and vCNS critical information disclosure vulnerability
VMware NSX and vCNS with SSL-VPN enabled contain a critical input validation vulnerability. This issue may allow a remote attacker to gain access to sensitive information.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-2079 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
* Note: NSX Edge 6.2.3 which addresses CVE-2016-2079 is no longer available for download. Customers are advised to update to NSX 6.2.4.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware NSX Downloads:
6. Change log
Initial security advisory in conjunction with the release of VMware NSX 6.2.3, 6.1.7 and vCNS 18.104.22.168 on 2016-06-09.
Updated security advisory to reflect that NSX Edge 6.2.x customers that use SSL-VPN
are advised to contact VMware support.
Updated security advisory in conjunction with the release of VMware NSX 6.2.4. Added to advisory that NSX 6.2.x customers are advised to update to NSX 6.2.4 since NSX 6.2.3 is no longer available for download.
Created on August 26, 2016 by Rick Scherer
Posted under Alert.
This blog has 1,770 views.