The certificate used by the Common Appliance Platform (CAP) service on port 8000 is outdated or incorrect, leading to security warnings generated from security team
Aria Suite Lifecycle 8.x
VMware Aria Suite Lifecycle uses the Common Appliance Platform (CAP), which replaces the VMware Appliance Management Interface (VAMI) for product installations and upgrades. CAP is an approach to standardize appliance management for all VMware appliances. CAP uses port 8000.
This is an appliance management backend server and doesn't host any webpages, it only accepts API calls.
Obtain a new certificate:
Replace the existing certificate:
cp /opt/vmware/etc/lighttpd/server.pem server.pem.old
vi /opt/vmware/etc/lighttpd/server.pem
Restart the CAP service:
service cap-appliance-management restart
By following these steps, you should be able to successfully replace the outdated self-signed certificate and ensure the proper functioning of the Cap-appliance-management service on port 8000.
VMware products require certificates in .pem format. Ensure your certificate is in the correct PEM format, as shown in the example below (without the actual certificate and key details)
-----BEGIN CERTIFICATE-----
Your Primary TLS/SSL certificate: your_domain_name.crt
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
Your Intermediate certificate: Intermediate.crt
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
Your Root certificate: TrustedRoot.crt
-----END CERTIFICATE-----
See also:
Tenable Nessus scanner reports vulnerability, TEN-142960 on port 8000 for Aria Suite Lifecycle