CIP of the vSphere Web Client) will need to be updated. Server, vCloud Director, and vRealize Automation Identity Appliance) and the client side (i.e. ![]() In order to remediate the issue, both the server side (i.e. vRealize Automation Identity Appliance 6.2.4 vCenter Server 6.0 (any 6.0 version prior to 6.0 U2) The vulnerability is present in versions of CIP that shipped with: This may allow for a Man in the Middle attack or Web session hijacking in case the user of the vSphere Web Client visits a malicious Web site. The VMware Client Integration Plugin does not handle session content in a safe way. ![]() Critical VMware Client Integration Plugin incorrect session handling VRealize Automation Identity Appliance 6.2.4Ī.
0 Comments
Leave a Reply. |