CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution
by CIRT Team
Description:
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Impacted Products:
VMware vCenter Server (vCenter Server)
VMware Cloud Foundation (Cloud Foundation)
CVSSv3 Score: 9.8 CRITICAL
Impact:
A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Mitigation: Updates are available. Please see the references or vendor advisory for more information.
Reference:
https://www.vmware.com/security/advisories/VMSA-2021-0010.html
Recommended Posts
Enhancing Situational Awareness on Emerging Cyber Threats
09 Sep 2023 - English articles, News, Security Advisories & Alerts, Uncategorized

UPDATE ON SITUATIONAL ALERT
08 Aug 2023 - Articles, News, Security Advisories & Alerts, Uncategorized