VMware is working on a fix for a vCentre Zero Day vulnerability that could result in unauthorized remote access.
A flaw within the management interface resulted in system level access to the hosting server, which could have led to the full compromise of the enterprise environment, said researchers at IT consulting firm, 7 Elements. The vulnerability takes advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine.
“VMware would like to thank Dough McLeod of 7 Elements Ltd and an anonymous researcher working through HP’s Zero Day Initiative for highlighting the vulnerability,” VMware officials said.
“It is a trivial exercise to gain full control over a vulnerable vCenter instance,” McLeod said. “We would strongly recommend anyone running vCenter to ensure they have either deployed the latest version from VMware or apply the relevant security patch.”
7 Elements started a long process to disclose the issue since there is significant commercial use of VMware products in enterprise level environments. VMware is providing fixes in the latest version of vCenter 6.0 update 1 as well as updates to all versions previously affected.