![vmware vcenter reporting vmware vcenter reporting](https://www.tecmint.com/wp-content/uploads/2019/04/Cross-vCenter-Workload-Migration-Utility.png)
A malicious actor with network access to port 443 on vCenter Server may exploit these issues to create a denial of service condition due to excessive memory consumption by VAPI service.A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.An authenticated user with non-administrative privilege may exploit this issue to gain access to sensitive information.A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) and vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service condition on the vCenter Server host.A malicious actor with network access to port 9087 on vCenter Server may exploit this issue to delete non critical files.
Vmware vcenter reporting code#
![vmware vcenter reporting vmware vcenter reporting](http://docs.uptimesoftware.com/download/attachments/6619322/gsg_vcenterAdd.png)
A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.Details of these vulnerabilities are as follows: Multiple vulnerabilities have been discovered in VMware vCenter Server, which could result in remote code execution. Large and medium business entities: HIGH.Large and medium government entities: HIGH.