1. Home
  2. System Vulnerabilities
  3. How to remediate – VMware SOAP API Settings

How to remediate – VMware SOAP API Settings

1. Introduction

The VMware SOAP API Settings vulnerability concerns the configuration of credentials used for checks performed via the VMware SOAP API. Incorrect settings can allow attackers to access sensitive information and potentially compromise systems. This affects VMware environments, typically those running vCenter Server and ESXi hosts. A successful exploit could lead to confidentiality, integrity, and availability issues.

2. Technical Explanation

This vulnerability arises from the initialisation of credentials used for VMware checks via the SOAP API. These credentials are sent over HTTPS but require correct configuration to prevent unauthorised access. An attacker gaining access to these credentials can perform actions with the privileges associated with the account, potentially leading to full system control.

  • Root cause: The script initialises credentials which, if not properly secured or managed, could be exposed.
  • Exploit mechanism: An attacker would need to obtain the configured SOAP API credentials and use them to authenticate against the vCenter Server via the SOAP API. This could involve exploiting other vulnerabilities to gain access to configuration files or intercepting network traffic.
  • Scope: VMware vCenter Server and ESXi hosts are affected, particularly those using the SOAP API for management tasks.

3. Detection and Assessment

You can check if the credentials have been configured by reviewing your scan policy settings. A thorough assessment involves checking network traffic for exposed credentials.

  • Quick checks: Review your scan policies within your vulnerability scanner to see if SOAP API credentials are defined in the ‘Credentials’ section.
  • Scanning: Nessus plugin ID 16829 can identify misconfigured VMware SOAP API settings as an example.
  • Logs and evidence: Check vCenter Server logs for authentication attempts using the configured SOAP API credentials. Look for unusual activity or failed login attempts.
# No specific command available, check scan policy configuration in your vulnerability scanner.

4. Solution / Remediation Steps

The following steps outline how to secure the VMware SOAP API settings.

4.1 Preparation

  • No services need to be stopped for this process.
  • A roll back plan involves restoring the previous snapshot if issues occur. Change approval may be required depending on internal policies.

4.2 Implementation

  1. Step 1: Open your vulnerability scanner and navigate to the scan policy configuration.
  2. Step 2: Locate the ‘Credentials’ section for VMware checks.
  3. Step 3: Ensure that strong, unique credentials are used for the SOAP API. Avoid using default or easily guessable passwords.
  4. Step 4: Verify that HTTPS is enforced for all communication with the vCenter Server.

4.3 Config or Code Example

Before

# Default credentials or weak password set in scan policy.

After

# Strong, unique password set in scan policy. HTTPS enforced for all communication.

4.4 Security Practices Relevant to This Vulnerability

  • Practice 1: Least privilege – grant only the necessary permissions to the SOAP API account.
  • Practice 2: Secure defaults – avoid using default credentials and enforce strong password policies.

4.5 Automation (Optional)

No automation script is provided due to the configuration-based nature of this vulnerability.

5. Verification / Validation

Confirm that the fix has been applied by reviewing your scan policy settings and verifying HTTPS communication.

  • Post-fix check: Review your scan policies within your vulnerability scanner to confirm strong, unique credentials are defined for SOAP API checks.
  • Re-test: Re-run Nessus plugin ID 16829 to ensure the vulnerability is no longer detected.
  • Monitoring: Monitor vCenter Server logs for authentication attempts using the configured SOAP API account, looking for any unusual activity.
# No specific command available, check scan policy configuration in your vulnerability scanner.

6. Preventive Measures and Monitoring

Update security baselines to include strong password requirements and regular credential rotation for example. Implement CI/CD pipeline checks to prevent the use of default credentials.

  • Baselines: Update a security baseline or policy with CIS control 5.1 (Secure Remote Access Protocols) as an example.
  • Pipelines: Add checks in your CI/CD pipelines to scan for hardcoded credentials or weak passwords.
  • Asset and patch process: Review configuration settings regularly, at least quarterly, to ensure compliance with security policies.

7. Risks, Side Effects, and Roll Back

  • Risk or side effect 1: Incorrectly configured credentials may prevent VMware checks from functioning correctly. Mitigation is restoring the previous snapshot.
  • Roll back: Restore the vCenter Server virtual machine to the pre-change snapshot if issues occur.

8. References and Resources

Updated on October 26, 2025

Was this article helpful?

Related Articles