Remote Session Hijack in VMware vCloud Director Affects Tenant and Provider Portals
CVE-2019-5523
9.8CRITICAL
Key Information:
- Vendor
- Vmware
- Vendor
- CVE Published:
- 1 April 2019
Summary
VMware vCloud Director for Service Providers prior to version 9.5.0.3 is susceptible to a Remote Session Hijack vulnerability affecting both Tenant and Provider Portals. Exploitation of this flaw enables an unauthorized party to impersonate a currently logged-in user, potentially granting them access to sensitive information and functionalities within the portals. Users are advised to apply the necessary updates to mitigate risk.
Affected Version(s)
VMware vCloud Director for Service Providers (vCD) 9.5.x before 9.5.0.3
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved