VMware vSphere Data Protection product update addresses a certificate validation vulnerability.
VMware vSphere Data Protection 5.8
VMware vSphere Data Protection 5.5 prior to 5.5.9
VMware vSphere Data Protection 5.1 all versions
a. VMware vSphere Data Protection certificate validation vulnerability
VMware vSphere Data Protection (VDP) does not fully validate SSL certificates coming from vCenter Server. This issue may allow a Man-in-the-Middle attack that enables the attacker to perform unauthorized backup and restore operations.
VMware would like to thank Thorsten Tüllmann of the Steinbuch Centre for Computing, KIT, Germany for reporting this issue to VMware and the EMC Product Security Response Center for working with us on the issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-4632 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
no patch planned
update to 5.5.9 or 5.8.1
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vSphere Data Protection
Initial security advisory for VDP 5.8.1 and 5.5.9 which were on released on 2015-01-29.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
Copyright 2015 VMware Inc. All rights reserved.