Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-5531

Summary
Assigner-vmware
Assigner Org ID-dcf2e128-44bd-42ed-91e8-88f912c1401d
Published At-18 Sep, 2019 | 21:42
Updated At-04 Aug, 2024 | 20:01
Rejected At-
Credits

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:vmware
Assigner Org ID:dcf2e128-44bd-42ed-91e8-88f912c1401d
Published At:18 Sep, 2019 | 21:42
Updated At:04 Aug, 2024 | 20:01
Rejected At:
▼CVE Numbering Authority (CNA)

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

Affected Products
Vendor
VMware (Broadcom Inc.)VMware
Product
VMware vSphere ESXi
Versions
Affected
  • 6.7 prior to ESXi670-201810101-SG
  • 6.5 prior to ESXi650-201811102-SG
  • 6.0 prior to ESXi600-201807103-SG
Vendor
VMware (Broadcom Inc.)VMware
Product
VMware vCenter Server
Versions
Affected
  • 6.7 prior to 6.7 U1b
  • 6.5 prior to 6.5 U2b
  • 6.0 prior to 6.0 U3j
Problem Types
TypeCWE IDDescription
textN/AInformation disclosure vulnerability
Type: text
CWE ID: N/A
Description: Information disclosure vulnerability
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vmware.com/security/advisories/VMSA-2019-0013.html
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2019-0013.html
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vmware.com/security/advisories/VMSA-2019-0013.html
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2019-0013.html
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@vmware.com
Published At:18 Sep, 2019 | 22:15
Updated At:10 Feb, 2020 | 21:53

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

VMware (Broadcom Inc.)
vmware
>>esxi>>6.7
cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.7
cpe:2.3:o:vmware:vsphere_esxi:6.7:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.7
cpe:2.3:o:vmware:vsphere_esxi:6.7:update_1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:a:vmware:vsphere_esxi:6.5:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:a:vmware:vsphere_esxi:6.5:u2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811002:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.5
cpe:2.3:o:vmware:vsphere_esxi:6.5:update_1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201810001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201811001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201903001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201905001:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:beta:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:u1a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:u1b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:u3a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:update_2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vsphere_esxi>>6.0
cpe:2.3:o:vmware:vsphere_esxi:6.0:update_3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:u3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.0
cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vcenter_server>>6.7
cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-613Primarynvd@nist.gov
CWE ID: CWE-613
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.vmware.com/security/advisories/VMSA-2019-0013.htmlsecurity@vmware.com
N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2019-0013.html
Source: security@vmware.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

15Records found

CVE-2018-15801
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-3.3||LOW
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-19 Dec, 2018 | 22:00
Updated-16 Sep, 2024 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authorization Bypass During JWT Issuer Validation with spring-security

Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-spring_frameworkSpring Security
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2015-6932
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.8||MEDIUM
EPSS-0.17% / 39.12%
||
7 Day CHG~0.00%
Published-18 Sep, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware vCenter Server 5.5 before u3 and 6.0 before u1 does not verify X.509 certificates from TLS LDAP servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_servern/a
CVE-2020-3954
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-6.1||MEDIUM
EPSS-0.50% / 64.90%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 17:17
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open Redirect vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vrealize_log_insightVMware vRealize Log Insight
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
CVE-2018-11067
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.1||MEDIUM
EPSS-0.54% / 66.60%
||
7 Day CHG~0.00%
Published-26 Nov, 2018 | 20:00
Updated-17 Sep, 2024 | 00:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dell EMC Avamar and Integrated Data Protection Appliance Open Redirection Vulnerability

Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Dell Inc.
Product-emc_integrated_data_protection_applianceemc_avamarvsphere_data_protectionIntegrated Data Protection ApplianceAvamar
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2014-1210
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.8||MEDIUM
EPSS-0.18% / 39.96%
||
7 Day CHG~0.00%
Published-11 Apr, 2014 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware vSphere Client 5.0 before Update 3 and 5.1 before Update 2 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vsphere_clientn/a
CVE-2018-6979
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.4||HIGH
EPSS-0.28% / 51.13%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 13:00
Updated-17 Sep, 2024 | 01:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The VMware Workspace ONE Unified Endpoint Management Console (A/W Console) 9.7.x prior to 9.7.0.3, 9.6.x prior to 9.6.0.7, 9.5.x prior to 9.5.0.16, 9.4.x prior to 9.4.0.22, 9.3.x prior to 9.3.0.25, 9.2.x prior to 9.2.3.27, and 9.1.x prior to 9.1.5.6 contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. This vulnerability is also relevant if certificate-based authentication is not enabled, but the outcome of exploitation is limited to an information disclosure (Important Severity) in those cases.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-airwatch_consoleVMware Workspace ONE Unified Endpoint Management Console (AirWatch Console)
CVE-2020-3994
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.4||HIGH
EPSS-0.13% / 32.76%
||
7 Day CHG~0.00%
Published-20 Oct, 2020 | 16:14
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_servercloud_foundationvCenter Server
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-31677
Matching Score-6
Assigner-VMware by Broadcom
ShareView Details
Matching Score-6
Assigner-VMware by Broadcom
CVSS Score-5.4||MEDIUM
EPSS-0.42% / 61.26%
||
7 Day CHG+0.26%
Published-29 Aug, 2022 | 14:03
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-pinnipedPinniped Supervisor
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2020-23140
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.27% / 50.29%
||
7 Day CHG~0.00%
Published-09 Nov, 2020 | 17:03
Updated-04 Aug, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active.

Action-Not Available
Vendor-n/aMicroweber (‘Microweber Academy’ Foundation)
Product-microwebern/a
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2020-15220
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.20% / 42.24%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 17:05
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session fixation

Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, two cookies are created for the same session, which leads to a possibility to steal user session. This is fixed in versions 2.7.2 and 3.0.0.

Action-Not Available
Vendor-combodoCombodo
Product-itopiTop
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2023-33005
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-5.4||MEDIUM
EPSS-0.19% / 40.90%
||
7 Day CHG~0.00%
Published-16 May, 2023 | 16:00
Updated-23 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login.

Action-Not Available
Vendor-Jenkins
Product-wso2_oauthJenkins WSO2 Oauth Plugin
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2019-19199
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.30% / 53.08%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:09
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

REDDOXX MailDepot 2032 SP2 2.2.1242 has Insufficient Session Expiration because tokens are not invalidated upon a logout.

Action-Not Available
Vendor-reddoxxn/a
Product-maildepotn/a
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2021-3844
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.05% / 15.27%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 16:37
Updated-19 Feb, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rapid7 InsightVM Insufficient Session Expiration

Rapid7 InsightVM suffers from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. This vulnerability is mitigated by the use of the Platform Login feature. This issue is related to CVE-2019-5638.

Action-Not Available
Vendor-Rapid7 LLC
Product-insightvmInsightVM
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2021-32923
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.64% / 69.59%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 10:38
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.

Action-Not Available
Vendor-n/aHashiCorp, Inc.
Product-vaultn/a
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2024-57056
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 9.86%
||
7 Day CHG~0.00%
Published-18 Feb, 2025 | 00:00
Updated-18 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect cookie session handling in WombatDialer before 25.02 results in the full session identity being written to system logs and could be used by a malicious attacker to impersonate an existing user session.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-613
Insufficient Session Expiration
Details not found