cvelist/2020/3xxx/CVE-2020-3944.json

65 lines
2.2 KiB
JSON
Raw Normal View History

2019-12-30 14:01:22 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-3944",
2020-02-19 21:01:29 +00:00
"ASSIGNER": "security@vmware.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "VMWare",
"product": {
"product_data": [
{
"product_name": "vRealize Operations for Horizon Adapter",
"version": {
"version_data": [
{
"version_value": "6.7.x prior to 6.7.1"
},
{
"version_value": "6.6.x prior to 6.6.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication bypass vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.vmware.com/security/advisories/VMSA-2020-0003.html",
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0003.html"
}
]
2019-12-30 14:01:22 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-02-19 21:01:29 +00:00
"value": "vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) has an improper trust store configuration leading to authentication bypass. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to bypass Adapter authentication."
2019-12-30 14:01:22 +00:00
}
]
}
}