Simplicity Across Clouds Is Rare
91% of executives are looking to improve “consistency across [their] public cloud environments."
Applications Need to Be Modernized
68% of developers want to expand use of modern application frameworks, APIs and services.
Distributed Work Models Are Here to Stay
72% of enterprise employees are working from non-traditional environments.
Security Is a Top-Down Concern
Risk related to security, data and privacy issues remains the #1 multi-cloud challenge.
Get on a Faster Path to Prod
Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster.
Simplify Kubernetes Operations
Build and operate a secure, multi-cloud container infrastructure at scale.
Pair with App Development Experts
Unlock value by modernizing your existing apps and building innovative new products.
Scale Your Business & Innovate
Secure, run, and manage modern apps at scale, across clouds with consistent operations, higher speed, and reduced risks.
Accelerate Cloud Transformation
Modernize infrastructure, ops and apps to reduce cross-cloud complexity, lower costs, and improve security.
Empower a Hybrid Workforce
Enable anywhere work with broad effective security, a frictionless employee experience, and reduced cost and complexity.
Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments.
Deliver an Engaging Experience
Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences.
Secure Today’s Anywhere Workspace
Ease the move to Zero Trust with situational intelligence and connected control points.
Automate the Workspace
Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management.
Secure & Connect Workloads
Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools.
Protect APIs — the New Endpoints
Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside.
Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Work with a VMware Partner
Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers.
Become a Partner
Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers.
|Synopsis||VMware vCenter Server Appliance updates address sensitive information disclosure vulnerability in backup and restore functions (CVE-2019-5537, CVE-2019-5538)
|Updated On||2019-10-24 (Initial Advisory)
VMware vCenter Server Appliance
Sensitive information disclosure vulnerabilities resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance may allow a malicious actor to intercept sensitive data in transit over FTPS and HTTPS (CVE-2019-5537) as well as SCP (CVE-2019-5538). VMware has evaluated the severity of these issues to be in the Moderate severity range with a maximum CVSSv3 base score of 6.8.
Known Attack Vectors:
A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.
To remediate CVE-2019-5537 and CVE-2019-5538 first apply the patches listed in the 'Fixed Version' column and then follow the instructions documented in KB75156 listed in the 'Additional Documentation' column found in the 'Resolution Matrix' below to enforce strict certificate validation.
To avoid breaking currently configured File-Based Backup and Restore workflows, remediation of CVE-2019-5537 and CVE-2019-5538 is not enabled by default. After upgrading vCenter Server Appliance, follow the steps in KB75156 to enforce strict certificate validation.
VMware would like to thank Thorsten Tüllmann, Karlsruhe Institute of Technology and James Renken for independently reporting these issues to us.
|Product||Version||Running On||CVE Identifier||CVSSV3||Severity||Fixed Version||Workarounds||Additional Documents|
|vCenter Server Appliance||6.7||Virtual Appliance
|vCenter Server Appliance||6.5||Virtual Appliance||CVE-2019-5537, CVE-2019-5538||6.8||Moderate||6.5u3d||None||KB75156|
|vCenter Server Appliance||6.0||Virtual Appliance||CVE-2019-5537, CVE-2019-5538||N/A||N/A||Unaffected||None||None|
Fixed Version(s) and Release Notes:
VMware vCenter Server Appliance 6.7u3a
VMware vCenter Server Appliance 6.5u3d
FIRST CVSSv3 Calculator:
Mitre CVE Dictionary Links:
Initial security advisory detailing remediations for CVE-2019-5537 and CVE-2019-5538 in VMware vCenter Server Appliance 6.7u3a and 6.5u3d.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2019 VMware Inc. All rights reserved.