10
CVSSv2

CVE-2015-2342

Published: 12/10/2015 Updated: 12/08/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote malicious users to execute arbitrary code via the RMI protocol.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware vcenter server 5.5

vmware vcenter server 6.0

vmware vcenter server 5.0

vmware vcenter server 5.1

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Java::Jmx include Msf::Exploit::Remote::HttpServer include Msf::Java::Rmi::Client def initialize(in ...

Github Repositories

Is it easier to fix the application than to detect attacks? It is obviously best not to have any exploitable vulnerabilities at all Then again vulnerabilities are always unknown at first so having intrusion detection and to verify the system integrity is at least some kind of countermeasure, especially if the detecting NIDS/HIDS can actively block traffic besides producing al

Recent Articles

VMware re-issues patch after vCenter fix fails to 'completely' fix bug
The Register • Simon Sharwood • 14 Feb 2016

First patch didn't patch so isn't a patch on the new patch

There's egg on face down VMware way after the company 'fessed up that a patch it delivered last year didn't completely work. The problem the patch failed to patch is VMSA-2015-0007, a nasty that means vCenter Server possesses a remotely accessible JMX RMI service that is not securely configured. News of that problem emerged, along with a patch, on October 1st 2015 to address CVE-2015-2342. So far, so good … until last Friday, February 12th 2016, when VMware updated its original advisory with n...