CVE-2016-7462
moderate-risk
Published 2016-12-29
The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
Do I need to act?
~
1.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.5/10
High
NETWORK
/ LOW complexity
Affected Products (5)
Vrealize Operations
Vrealize Operations
Vrealize Operations
Vrealize Operations
Vrealize Operations
Affected Vendors
References (8)
Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2016-0020.html
Technical Description
https://www.tenable.com/security/research/tra-2016-34
Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2016-0020.html
Technical Description
https://www.tenable.com/security/research/tra-2016-34
45
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
4/34 · Minimal
Exposure
12/34 · Low