VMware NSX and vCNS product updates address a critical information disclosure vulnerability
VMware Security Advisory
VMware NSX and vCNS product updates address a critical information disclosure vulnerability.
2. Relevant Releases
NSX 6.2 prior to 6.2.3
NSX 6.1 prior to 6.1.7
vCNS 5.5.4 prior to 184.108.40.206
3. Problem Description
a. VMware NSX and vCNS critical information disclosure vulnerability
VMware NSX and vCNS with SSL-VPN enabled contain a critical input validation vulnerability. This issue may allow a remote attacker to gain access to sensitive information.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-2079 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Replace with/ Apply Patch
* Note: NSX Edge 6.2.3 which addresses CVE-2016-2079 is no longer available for download. Customers are advised to update to NSX 6.2.4.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware NSX Downloads:
VMware Knowledge Base article 2006985
6. Change log
Initial security advisory in conjunction with the release of VMware NSX 6.2.3, 6.1.7 and vCNS 220.127.116.11 on 2016-06-09.
Updated security advisory to reflect that NSX Edge 6.2.x customers that use SSL-VPN
are advised to contact VMware support.
Updated security advisory in conjunction with the release of VMware NSX 6.2.4. Added to advisory that NSX 6.2.x customers are advised to update to NSX 6.2.4 since NSX 6.2.3 is no longer available for download.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
Consolidated list of VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
Copyright 2016 VMware Inc. All rights reserved.