Vulnerabilities > CVE-2015-6932 - Cryptographic Issues vulnerability in VMWare Vcenter Server 5.5/6.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

VMware vCenter Server 5.5 before u3 and 6.0 before u1 does not verify X.509 certificates from TLS LDAP servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Vulnerable Configurations

Part Description Count
Application
Vmware
12

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyMisc.
    NASL idVMWARE_VCENTER_VMSA-2015-0006_55.NASL
    descriptionThe VMware vCenter Server installed on the remote host is version 5.5 prior to 5.5u3. It is, therefore, affected by a man-in-the-middle spoofing vulnerability due to improper validation of X.509 certificates from TLS LDAP servers. A remote, man-in-the-middle attacker can exploit this to intercept network traffic by spoofing a TLS server via a crafted certificate, resulting in the manipulation or disclosure of sensitive information.
    last seen2020-06-01
    modified2020-06-02
    plugin id86124
    published2015-09-24
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86124
    titleVMware vCenter 5.5 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86124);
      script_version("1.12");
      script_cvs_date("Date: 2019/09/24 15:02:54");
    
      script_cve_id("CVE-2015-6932");
      script_xref(name:"VMSA", value:"2015-0006");
    
      script_name(english:"VMware vCenter 5.5 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006)");
      script_summary(english:"Checks the version of VMware vCenter.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has a virtualization management application installed
    that is affected by a man-in-the-middle spoofing vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The VMware vCenter Server installed on the remote host is version 5.5
    prior to 5.5u3. It is, therefore, affected by a man-in-the-middle
    spoofing vulnerability due to improper validation of X.509
    certificates from TLS LDAP servers. A remote, man-in-the-middle
    attacker can exploit this to intercept network traffic by spoofing a
    TLS server via a crafted certificate, resulting in the manipulation or
    disclosure of sensitive information.");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2015-0006.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to VMware vCenter Server 5.5u3 (5.5.0 build-3000241) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/09/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/24");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:vcenter_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2015-2019 Tenable Network Security, Inc.");
    
      script_dependencies("vmware_vcenter_detect.nbin");
      script_require_keys("Host/VMware/vCenter", "Host/VMware/version", "Host/VMware/release");
      script_require_ports("Services/www", 80, 443);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    port = get_kb_item_or_exit("Host/VMware/vCenter");
    version = get_kb_item_or_exit("Host/VMware/version");
    release = get_kb_item_or_exit("Host/VMware/release");
    
    # Extract and verify the build number
    build = ereg_replace(pattern:'^VMware vCenter Server [0-9\\.]+ build-([0-9]+)$', string:release, replace:"\1");
    if (build !~ '^[0-9]+$') exit(1, 'Failed to extract the build number from the release string.');
    
    release = release - 'VMware vCenter Server ';
    fixversion = NULL;
    
    # Check version and build numbers
    if (version =~ '^VMware vCenter 5\\.5$' && int(build) < 3000241) fixversion = '5.5.0 build-3000241';
    else audit(AUDIT_LISTEN_NOT_VULN, 'VMware vCenter', port, release);
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + release +
        '\n  Fixed version     : ' + fixversion +
        '\n';
      security_warning(port:port, extra:report);
    }
    else security_warning(port);
    
  • NASL familyMisc.
    NASL idVMWARE_VCENTER_VMSA-2015-0006_60.NASL
    descriptionThe VMware vCenter Server installed on the remote host is version 6.0 prior to 6.0u1. It is, therefore, affected by a man-in-the-middle spoofing vulnerability due to improper validation of X.509 certificates from TLS LDAP servers. A remote, man-in-the-middle attacker can exploit this to intercept network traffic by spoofing a TLS server via a crafted certificate, resulting in the manipulation or disclosure of sensitive information.
    last seen2020-06-01
    modified2020-06-02
    plugin id86125
    published2015-09-24
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86125
    titleVMware vCenter 6.0 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86125);
      script_version("1.7");
      script_cvs_date("Date: 2018/11/15 20:50:24");
    
      script_cve_id("CVE-2015-6932");
      script_xref(name:"VMSA", value:"2015-0006");
    
      script_name(english:"VMware vCenter 6.0 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006)");
      script_summary(english:"Checks the version of VMware vCenter.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has a virtualization management application installed
    that is affected by a man-in-the-middle spoofing vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The VMware vCenter Server installed on the remote host is version 6.0
    prior to 6.0u1. It is, therefore, affected by a man-in-the-middle
    spoofing vulnerability due to improper validation of X.509
    certificates from TLS LDAP servers. A remote, man-in-the-middle
    attacker can exploit this to intercept network traffic by spoofing a
    TLS server via a crafted certificate, resulting in the manipulation or
    disclosure of sensitive information.");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2015-0006.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to VMware vCenter Server 6.0u1 (6.0.0 build-3018521) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/09/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/24");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:vcenter_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies("vmware_vcenter_detect.nbin");
      script_require_keys("Host/VMware/vCenter", "Host/VMware/version", "Host/VMware/release");
      script_require_ports("Services/www", 80, 443);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    port = get_kb_item_or_exit("Host/VMware/vCenter");
    version = get_kb_item_or_exit("Host/VMware/version");
    release = get_kb_item_or_exit("Host/VMware/release");
    
    # Extract and verify the build number
    build = ereg_replace(pattern:'^VMware vCenter Server [0-9\\.]+ build-([0-9]+)$', string:release, replace:"\1");
    if (build !~ '^[0-9]+$') exit(1, 'Failed to extract the build number from the release string.');
    
    release = release - 'VMware vCenter Server ';
    fixversion = NULL;
    
    # Check version and build numbers
    if (version =~ '^VMware vCenter 6\\.0$' && int(build) < 3018521) fixversion = '6.0.0 build-3018521';
    else audit(AUDIT_LISTEN_NOT_VULN, 'VMware vCenter', port, release);
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + release +
        '\n  Fixed version     : ' + fixversion +
        '\n';
      security_warning(port:port, extra:report);
    }
    else security_warning(port);