VMware vCloud Director for Service Providers update resolves a Remote Session Hijack vulnerability
2. Relevant Products
-VMware vCloud Director for Service Providers (vCD)
3. Problem Description
VMware vCloud Director for Service Providers update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session.
VMware would like to thank Tyler Flaagan, Eric Holm, Andrew Kramer, and Logan Stratton of Dakota State University for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5523 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
|VMware Product||Product Version||Running On||Severity||Replace_with/Apply_Patch||Mitigation/Workaround|
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCloud Director for Service Providers 184.108.40.206
Documentation and Downloads:
6. Change log
Initial security advisory in conjunction with the release of VMware vCloud Director for Service Providers 220.127.116.11 on 2019-03-28.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2019 VMware Inc. All rights reserved.