Vulnerabilities > CVE-2014-8371 - Cryptographic Issues vulnerability in VMWare Vcenter Server Appliance 5.0/5.1/5.5

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
vmware
CWE-310
nessus

Summary

VMware vCenter Server Appliance (vCSA) 5.5 before Update 2, 5.1 before Update 3, and 5.0 before Update 3c does not properly validate certificates when connecting to a CIM Server on an ESXi host, which allows man-in-the-middle attackers to spoof CIM servers via a crafted certificate.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyMisc.
    NASL idVMWARE_VCENTER_VMSA-2014-0012.NASL
    descriptionThe VMware vCenter Server installed on the remote host is version 5.0 prior to Update 3c, 5.1 prior to Update 3, or 5.5 prior to Update 2. It is, therefore, affected by multiple vulnerabilities in third party libraries : - Due to improper certificate validation when connecting to a CIM server on an ESXi host, an attacker can perform man-in-the-middle attacks. (CVE-2014-8371) - The bundled version of Oracle JRE is prior to 1.6.0_81 and thus is affected by multiple vulnerabilities. Note that this only affects version 5.1 and 5.0 of vCenter but is only fixed in 5.1 Update 3.
    last seen2020-06-01
    modified2020-06-02
    plugin id79865
    published2014-12-12
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79865
    titleVMware Security Updates for vCenter Server (VMSA-2014-0012)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79865);
      script_version("1.9");
      script_cvs_date("Date: 2018/11/15 20:50:24");
    
      script_cve_id(
        "CVE-2014-0015",
        "CVE-2014-0138",
        "CVE-2014-0191",
        "CVE-2014-2483",
        "CVE-2014-2490",
        "CVE-2014-4208",
        "CVE-2014-4209",
        "CVE-2014-4216",
        "CVE-2014-4218",
        "CVE-2014-4219",
        "CVE-2014-4220",
        "CVE-2014-4221",
        "CVE-2014-4223",
        "CVE-2014-4227",
        "CVE-2014-4244",
        "CVE-2014-4247",
        "CVE-2014-4252",
        "CVE-2014-4262",
        "CVE-2014-4263",
        "CVE-2014-4264",
        "CVE-2014-4265",
        "CVE-2014-4266",
        "CVE-2014-4268",
        "CVE-2014-8371"
      );
      script_bugtraq_id(
        65270,
        66457,
        67233,
        68562,
        68571,
        68576,
        68580,
        68583,
        68590,
        68596,
        68599,
        68603,
        68608,
        68612,
        68615,
        68620,
        68624,
        68626,
        68632,
        68636,
        68639,
        68642,
        68645,
        71493
      );
      script_xref(name:"VMSA", value:"2014-0012");
    
      script_name(english:"VMware Security Updates for vCenter Server (VMSA-2014-0012)");
      script_summary(english:"Checks the version of VMware vCenter.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has a virtualization management application installed
    that is affected by multiple security vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The VMware vCenter Server installed on the remote host is version 5.0
    prior to Update 3c, 5.1 prior to Update 3, or 5.5 prior to Update 2.
    It is, therefore, affected by multiple vulnerabilities in third party
    libraries :
    
      - Due to improper certificate validation when connecting
        to a CIM server on an ESXi host, an attacker can
        perform man-in-the-middle attacks. (CVE-2014-8371)
    
      - The bundled version of Oracle JRE is prior to 1.6.0_81
        and thus is affected by multiple vulnerabilities. Note
        that this only affects version 5.1 and 5.0 of vCenter
        but is only fixed in 5.1 Update 3.");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2014-0012.html");
      script_set_attribute(attribute:"see_also", value:"http://lists.vmware.com/pipermail/security-announce/2014/000283.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to VMware vCenter Server 5.5u2 (5.5.0 build-2001466) / 5.1u3
    (5.1.0 build-2306353) / 5.0u3c (5.0.0 build-2210222) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/01/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/09/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/12");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:vcenter_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("vmware_vcenter_detect.nbin");
      script_require_keys("Host/VMware/vCenter", "Host/VMware/version", "Host/VMware/release");
      script_require_ports("Services/www", 80, 443);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    port = get_kb_item_or_exit("Host/VMware/vCenter");
    version = get_kb_item_or_exit("Host/VMware/version");
    release = get_kb_item_or_exit("Host/VMware/release");
    
    # Extract and verify the build number
    build = ereg_replace(pattern:'^VMware vCenter Server [0-9\\.]+ build-([0-9]+)$', string:release, replace:"\1");
    if (build !~ '^[0-9]+$') exit(1, 'Failed to extract the build number from the release string.');
    
    release = release - 'VMware vCenter Server ';
    fixversion = NULL;
    
    # Check version and build numbers
    if (version =~ '^VMware vCenter 5\\.0$' && int(build) < 2210222) fixversion = '5.0.0 build-2210222';
    else if (version =~ '^VMware vCenter 5\\.1$' && int(build) < 2306353) fixversion = '5.1.0 build-2306353';
    else if (version =~ '^VMware vCenter 5\\.5$' && int(build) < 2001466) fixversion = '5.5.0 build-2001466';
    else audit(AUDIT_LISTEN_NOT_VULN, 'VMware vCenter', port, release);
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + release +
        '\n  Fixed version     : ' + fixversion +
        '\n';
      security_hole(port:port, extra:report);
    }
    else security_hole(port);
    
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2014-0012.NASL
    descriptiona. VMware vCSA cross-site scripting vulnerability VMware vCenter Server Appliance (vCSA) contains a vulnerability that may allow for Cross Site Scripting. Exploitation of this vulnerability in vCenter Server requires tricking a user to click on a malicious link or to open a malicious web page. VMware would like to thank Tanya Secker of Trustwave SpiderLabs for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-3797 to this issue. b. vCenter Server certificate validation issue vCenter Server does not properly validate the presented certificate when establishing a connection to a CIM Server residing on an ESXi host. This may allow for a Man-in-the-middle attack against the CIM service. VMware would like to thank The Google Security Team for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-8371 to this issue. c. Update to ESXi libxml2 package libxml2 is updated to address multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2013-2877 and CVE-2014-0191 to these issues. d. Update to ESXi Curl package Curl is updated to address multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2014-0015 and CVE-2014-0138 to these issues. e. Update to ESXi Python package Python is updated to address multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2013-1752 and CVE-2013-4238 to these issues. f. vCenter and Update Manager, Oracle JRE 1.6 Update 81 Oracle has documented the CVE identifiers that are addressed in JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update Advisory of July 2014. The References section provides a link to this advisory.
    last seen2020-06-01
    modified2020-06-02
    plugin id79762
    published2014-12-06
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79762
    titleVMSA-2014-0012 : VMware vSphere product updates address security vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from VMware Security Advisory 2014-0012. 
    # The text itself is copyright (C) VMware Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79762);
      script_version("1.11");
      script_cvs_date("Date: 2019/09/24 15:02:54");
    
      script_cve_id("CVE-2013-1752", "CVE-2013-2877", "CVE-2013-4238", "CVE-2014-0015", "CVE-2014-0138", "CVE-2014-0191", "CVE-2014-3797", "CVE-2014-8371");
      script_bugtraq_id(61050, 61738, 63804, 65270, 66457, 67233, 71492, 71493);
      script_xref(name:"VMSA", value:"2014-0012");
    
      script_name(english:"VMSA-2014-0012 : VMware vSphere product updates address security vulnerabilities");
      script_summary(english:"Checks esxupdate output for the patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote VMware ESXi host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "a. VMware vCSA cross-site scripting vulnerability
    
       VMware vCenter Server Appliance (vCSA) contains a vulnerability
       that may allow for Cross Site Scripting. Exploitation of this 
       vulnerability in vCenter Server requires tricking a user to click
       on a malicious link or to open a malicious web page. 
    
       VMware would like to thank Tanya Secker of Trustwave SpiderLabs for 
       reporting this issue to us. 
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) 
       has assigned the name CVE-2014-3797 to this issue. 
    
    b. vCenter Server certificate validation issue
    
       vCenter Server does not properly validate the presented certificate 
       when establishing a connection to a CIM Server residing on an ESXi 
       host. This may allow for a Man-in-the-middle attack against the CIM 
       service.
    
       VMware would like to thank The Google Security Team for reporting 
       this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the identifier CVE-2014-8371 to this issue. 
    
      c. Update to ESXi libxml2 package
    
      libxml2 is updated to address multiple security issues. 
    
      The Common Vulnerabilities and Exposures project 
      (cve.mitre.org) has assigned the names CVE-2013-2877 and
      CVE-2014-0191 to these issues. 
    
      d. Update to ESXi Curl package
    
      Curl is updated to address multiple security issues. 
    
      The Common Vulnerabilities and Exposures project 
      (cve.mitre.org) has assigned the names CVE-2014-0015 and 
      CVE-2014-0138 to these issues. 
    
      e. Update to ESXi Python package
    
      Python is updated to address multiple security issues. 
    
      The Common Vulnerabilities and Exposures project 
      (cve.mitre.org) has assigned the names CVE-2013-1752 and 
      CVE-2013-4238 to these issues. 
    
      f. vCenter and Update Manager, Oracle JRE 1.6 Update 81
    
      Oracle has documented the CVE identifiers that are addressed in 
      JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update
      Advisory of July 2014. The References section provides a link to
      this advisory."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.vmware.com/pipermail/security-announce/2015/000287.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply the missing patch.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:5.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/06");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"VMware ESX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/VMware/release", "Host/VMware/version");
      script_require_ports("Host/VMware/esxupdate", "Host/VMware/esxcli_software_vibs");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("vmware_esx_packages.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/VMware/release")) audit(AUDIT_OS_NOT, "VMware ESX / ESXi");
    if (
      !get_kb_item("Host/VMware/esxcli_software_vibs") &&
      !get_kb_item("Host/VMware/esxupdate")
    ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    init_esx_check(date:"2014-12-04");
    flag = 0;
    
    
    if (esx_check(ver:"ESXi 5.1", vib:"VMware:esx-base:5.1.0-2.47.2323231")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:esx_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");