NSX Bytes: Critical Update for NSX-v and vCNS
I generally don’t post around security releases but after going through the notes on CVE-2016-2079 I thought it was important enough to dedicate a post around. Mainly because it could impact those running NSX Edge Services Gateways or vShield Edges with the SSL-VPN service enabled for clients.
Most vCloud Director based instances won’t have the SSL-VPN enabled due to it not being exposed through the vCD UI however some Service Providers may offer this as a managed service as it’s one of the strongest features of the Edge Gateways. The issue detailed in the CVE is summarized below.
VMware NSX and vCNS with SSL-VPN enabled contain a critical input validation vulnerability. This issue may allow a remote attacker to gain access to sensitive information.
In a nutshell you need to upgrade an existing version of NSX-v or vCNS to the version below. As per usual if you have the entitlements go ahead and download the updates from the links below.
- NSX Edge: 6.2 -> 6.2.3
- NSX Edge: 6.1 -> 6.1.7
- vCNS Edge: 5.5 -> 5.5.4.3
NSX-v Downloads: https://www.vmware.com/go/download-nsx-vsphere vCNS Downloads: https://www.vmware.com/go/download-vcd-ns References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2079