VMware has released updates for some of its products to address several vulnerabilities, including an information disclosure issue rated critical.
In an advisory published on Thursday, the company revealed that VMware NSX and vCloud Networking and Security (vCNS) are plagued by a critical input validation flaw (CVE-2016-2079). The vulnerability can be exploited by a remote attacker to gain access to sensitive information.
The flaw affects NSX Edge 6.1 and 6.2, and vCNS Edge 5.5. Users have been advised to update to versions 6.1.7, 6.2.3 and 5.5.4.3, respectively.
It’s worth noting that vCNS has reached end of availability (EOA) and it has been removed from vCloud Suite 6, although it’s still available as part of vCloud Suite 5.5. VMware has advised customers using vCNS, which is not available as a standalone product since 2013, to migrate to NSX.
A separate advisory published by VMware on Thursday describes important and moderate severity issues affecting vRealize Log Insight.
According to the company, Lukasz Plonka discovered that the product is plagued by a stored cross-site scripting (XSS) vulnerability that allows an attacker to hijack an authenticated user’s session (CVE-2016-2081).
Plonka also discovered that vRealize Log Insight is affected by a cross-site request forgery (CSRF) flaw that can be exploited by an attacker to replace content in the user interface (CVE-2016-2082).
These vulnerabilities affect vRealize Log Insight 2.x and 3.x running on virtual appliances, and they have been addressed with the release of version 3.3.2.
Last month, VMware rolled out security updates for Workstation, Player, vCenter Server, vSphere Replication, vCloud Director and vRealize Operations Manager to address important and critical vulnerabilities.
Related: VMware Patches Critical Vulnerability
Related: VMware Patches XSS Flaws in vRealize