Critical severity9.0NVD Advisory· Published Jul 28, 2017· Updated May 13, 2026
CVE-2017-4919
CVE-2017-4919
Description
VMware vCenter Server 5.5, 6.0, 6.5 allows vSphere users with certain, limited vSphere privileges to use the VIX API to access Guest Operating Systems without the need to authenticate.
Affected products
4cpe:2.3:a:vmware:vcenter_server:5.5:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:vmware:vcenter_server:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*
- VMware/VMware vCenter Serverv5Range: VMware vCenter Server 5.5.x, 6.0.x, 6.5.x
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/100102nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039004nvdThird Party AdvisoryVDB Entry
- www.vmware.com/security/advisories/VMSA-2017-0012.htmlnvdMitigationVendor Advisory
News mentions
0No linked articles in our index yet.