The use of Linux-based clients must be restricted.

From VMware vCenter Server Version 5 Security Technical Implementation Guide

Part of ESXi5-420

Associated with: CCI-000366

SV-51417r1_rule The use of Linux-based clients must be restricted.

Vulnerability discussion

Although SSL-based encryption is used to protect communication between client components and vCenter Server or ESXi, the Linux versions of these components do not perform certificate validation. Even if the self-signed certificates are replaced on vCenter and ESXi with legitimate certificates signed by the local root certificate authority or a third party, communications with Linux clients are still vulnerable to MiTM attacks.

Check content

Verify all client operating systems connecting to the vCenter Server are not Linux. If any client operating system connecting to the vCenter Server is Linux-based, this is a finding.

Fix text

Replace all Linux-based clients connecting to the vCenter Server with non-Linux-based clients.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer