CVE-2016-3642

Published on: 06/17/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Virtualization Manager from Solarwinds contain the following vulnerability:

The RMI service in SolarWinds Virtualization Manager 6.3.1 and earlier allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

  • CVE-2016-3642 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Full Disclosure: Java Deserialization in Solarwinds Virtualization Manager 6.3.1 seclists.org
text/html
URL Logo FULLDISC 20160615 Java Deserialization in Solarwinds Virtualization Manager 6.3.1
Solarwinds Virtualization Manager 6.3.1 Java Deserialization ≈ Packet Storm Exploit
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/137486/Solarwinds-Virtualization-Manager-6.3.1-Java-Deserialization.html
Full Disclosure: CVE-2016-3642 - Java Deserialization in Solarwinds Virtualization Manager 6.3.1 seclists.org
text/html
URL Logo FULLDISC 20160615 CVE-2016-3642 - Java Deserialization in Solarwinds Virtualization Manager 6.3.1

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSolarwindsVirtualization ManagerAllAllAllAll
  • cpe:2.3:a:solarwinds:virtualization_manager:*:*:*:*:*:*:*:*: