High severity7.6NVD Advisory· Published Apr 15, 2016· Updated May 6, 2026
CVE-2016-2076
CVE-2016-2076
Description
Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.
Affected products
6cpe:2.3:a:vmware:vcenter_server:*:1b:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:vmware:vcenter_server:*:1b:*:*:*:*:*:*range: <=6.0
- cpe:2.3:a:vmware:vcenter_server:5.5:3a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:5.5:3b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:5.5:u3c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcloud_automation_identity_appliance:6.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcloud_director:5.5.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.securitytracker.com/id/1035570nvdThird Party Advisory
- www.securitytracker.com/id/1035571nvdThird Party Advisory
- www.securitytracker.com/id/1035572nvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2016-0004.htmlnvdVendor Advisory
News mentions
0No linked articles in our index yet.