VMware NSX-T updates address a privilege escalation vulnerability (CVE-2021-21981)

2021-04-19T00:00:00
ID VMSA-2021-0006
Type vmware
Reporter VMware
Modified 2021-04-19T00:00:00

Description

1. Impacted Products
  • VMware NSX-T
2. Introduction

A privilege escalation vulnerability in VMware NSX-T was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware product.

3. Privilege escalation vulnerability (CVE-2021-21981)

Description

VMware NSX-T contains a privilege escalation vulnerability due to an issue with RBAC (Role based access control) role assignment. VMware has evaluated this issue to be 'Important' severity with a maximum CVSSv3 base score of 7.5.

Known Attack Vectors

Successful exploitation of this issue may allow attackers with local guest user account to assign privileges higher than their own permission level.

Resolution

To remediate CVE-2021-21981 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds

Workarounds for CVE-2021-21981 have been listed in the 'Workarounds' column of the 'Response Matrix' below.

Additional Documentation

None.

Notes

[1] To exploit this issue, NSX Enterprise administrator must activate the local guest user account. It is not activated by default.
[2] This issue affects only version 3.1.1. Other versions are not affected.

Acknowledgements

None.