Lucene search

K
nessusThis script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.VMWARE_VCENTER_CVE-2021-21985.NBIN
HistoryJun 03, 2021 - 12:00 a.m.

VMware vCenter Server Virtual SAN Health Check plug-in RCE (CVE-2021-21985) (direct check)

2021-06-0300:00:00
This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
70

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U2b, 6.7 before 6.7 U3n, and 6.5 before 6.5 U3p) and VMware Cloud Foundation (4.x before 4.2.1 and 3.x before 3.10.2.1).

Binary data vmware_vcenter_cve-2021-21985.nbin
VendorProductVersion
vmwarevcenter_server
Related for VMWARE_VCENTER_CVE-2021-21985.NBIN