Vulnerability Details : CVE-2011-1789
The self-extracting installer in the vSphere Client Installer package in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, VMware ESXi 4.x before 4.1 Update 1, and VMware ESX 4.x before 4.1 Update 1 does not have a digital signature, which might make it easier for remote attackers to spoof the software distribution via a Trojan horse installer.
Threat overview for CVE-2011-1789
Top countries where our scanners detected CVE-2011-1789
Top open port discovered on systems with this issue
443
IPs affected by CVE-2011-1789 92
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-1789!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-1789
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 44 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1789
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-1789
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1789
-
http://lists.vmware.com/pipermail/security-announce/2011/000137.html
[Security-announce] VMSA-2011-0008 VMware vCenter Server and vSphere Client security vulnerabilitiesPatch
-
http://www.vmware.com/security/advisories/VMSA-2011-0008.html
VMSA-2011-0008Patch;Vendor Advisory
-
http://securitytracker.com/id?1025502
VMware vCenter Discloses File to Remote Users and Let Local Users Gain Elevated Privileges - SecurityTracker
Products affected by CVE-2011-1789
- cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter:4.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter:4.0:update_2:*:*:*:*:*:*