Lucene search

K
cvelistVmwareCVELIST:CVE-2021-21985
HistoryMay 26, 2021 - 2:04 p.m.

CVE-2021-21985

2021-05-2614:04:30
vmware
www.cve.org
2

10 High

AI Score

Confidence

High

0.974 High

EPSS

Percentile

99.9%

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

CNA Affected

[
  {
    "product": "VMware vCenter Server and VMware Cloud Foundation",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "VMware vCenter Server (7.x before 7.0 U2b, 6.7 before 6.7 U3n, 6.5 before 6.5 U3p) and VMware Cloud Foundation (4.x before 4.2.1, 3.x before 3.10.2.1)"
      }
    ]
  }
]