How to remediate – VMware vCenter Inactive Virtual Machines 1. Introduction The VMware vCenter Inactive Virtual Machines vulnerability allows an attacker with valid credentials for a VMware vCenter server...
How to remediate – VNC Server Unauthenticated Access: Screenshot 1. Introduction The VNC Server Unauthenticated Access: Screenshot vulnerability means a remote VNC server does not require a username and...
How to remediate – VMware vCenter Detect 1. Introduction VMware vCenter Detect identifies VMware vCenter servers running on your network. This is important because vCenter is a...
How to remediate – VNC Server Unauthenticated Access 1. Introduction The VNC Server Unauthenticated Access vulnerability means a remote user can connect to a system using VNC without...
How to remediate – VMware vCenter Data Collection 1. Introduction The VMware vCenter Data Collection vulnerability involves collecting all data from VMware vCenter using its REST APIs. This...
How to remediate – VNC Server ‘password’ Password 1. Introduction A VNC server running on a remote host is secured with the weak password ‘password’. This means an...
How to remediate – VMware vCenter Auto Discovery 1. Introduction VMware vCenter Auto Discovery allows automatic collection of information about VMware vSphere hosts and virtual machines connected to...
How to remediate – VMware vCenter API Settings 1. Introduction The VMware vCenter API Settings vulnerability concerns the configuration of credentials used for checks within VMware environments via...
How to remediate – VMware vCenter Active Virtual Machines 1. Introduction The VMware vCenter Active Virtual Machines vulnerability allows enumeration of active virtual machines running on a server. This...
How to remediate – VMware Tools Detection (macOS) 1. Introduction VMware Tools Detection (macOS) identifies instances where VMware Tools, a virtual machine management application, is installed on a...