VYPR
High severity7.6NVD Advisory· Published Apr 15, 2016· Updated May 6, 2026

CVE-2016-2076

CVE-2016-2076

Description

Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.

Affected products

6
  • cpe:2.3:a:vmware:vcenter_server:*:1b:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:vmware:vcenter_server:*:1b:*:*:*:*:*:*range: <=6.0
    • cpe:2.3:a:vmware:vcenter_server:5.5:3a:*:*:*:*:*:*
    • cpe:2.3:a:vmware:vcenter_server:5.5:3b:*:*:*:*:*:*
    • cpe:2.3:a:vmware:vcenter_server:5.5:u3c:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcloud_automation_identity_appliance:6.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vcloud_director:5.5.5:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.