Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-7460


The Single Sign-On feature in VMware vCenter Server 5.5 before U3e and 6.0 before U2a and vRealize Automation 6.x before 6.2.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.


Published

2016-12-29T09:59:00.663

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 9.1 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-611

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application vmware vrealize_automation 6.0.0 Yes
Application vmware vrealize_automation 6.0.1 Yes
Application vmware vrealize_automation 6.0.1.1 Yes
Application vmware vrealize_automation 6.0.1.2 Yes
Application vmware vrealize_automation 6.1.0 Yes
Application vmware vrealize_automation 6.1.1 Yes
Application vmware vrealize_automation 6.2.0 Yes
Application vmware vrealize_automation 6.2.1 Yes
Application vmware vrealize_automation 6.2.2 Yes
Application vmware vrealize_automation 6.2.3 Yes
Application vmware vrealize_automation 6.2.4 Yes

References