High severity8.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2016-7462
CVE-2016-7462
Description
The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
Affected products
5cpe:2.3:a:vmware:vrealize_operations:6.0.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:vmware:vrealize_operations:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vrealize_operations:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vrealize_operations:6.2.0a:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vrealize_operations:6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vrealize_operations:6.3.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.vmware.com/security/advisories/VMSA-2016-0020.htmlnvdVendor Advisory
- www.tenable.com/security/research/tra-2016-34nvdTechnical DescriptionThird Party Advisory
- www.securityfocus.com/bid/94351nvd
- www.securitytracker.com/id/1037297nvd
News mentions
0No linked articles in our index yet.