10

CVE-2021-21972

Warning
Exploit

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).

Data is provided by the National Vulnerability Database (NVD)
VMwareCloud Foundation Version >= 3.0 < 3.10.1.2
VMwareCloud Foundation Version >= 4.0 < 4.2
VMwareVcenter Server Version6.5 Update-
VMwareVcenter Server Version6.5 Updatea
VMwareVcenter Server Version6.5 Updateb
VMwareVcenter Server Version6.5 Updatec
VMwareVcenter Server Version6.5 Updated
VMwareVcenter Server Version6.5 Updatee
VMwareVcenter Server Version6.5 Updatef
VMwareVcenter Server Version6.5 Updateupdate1d
VMwareVcenter Server Version6.5 Updateupdate1e
VMwareVcenter Server Version6.5 Updateupdate1g
VMwareVcenter Server Version6.5 Updateupdate2
VMwareVcenter Server Version6.5 Updateupdate2b
VMwareVcenter Server Version6.5 Updateupdate2c
VMwareVcenter Server Version6.5 Updateupdate2d
VMwareVcenter Server Version6.5 Updateupdate2g
VMwareVcenter Server Version6.5 Updateupdate3
VMwareVcenter Server Version6.5 Updateupdate3d
VMwareVcenter Server Version6.5 Updateupdate3f
VMwareVcenter Server Version6.5 Updateupdate3k
VMwareVcenter Server Version6.7 Update-
VMwareVcenter Server Version6.7 Updatea
VMwareVcenter Server Version6.7 Updateb
VMwareVcenter Server Version6.7 Updated
VMwareVcenter Server Version6.7 Updateupdate1
VMwareVcenter Server Version6.7 Updateupdate1b
VMwareVcenter Server Version6.7 Updateupdate2
VMwareVcenter Server Version6.7 Updateupdate2a
VMwareVcenter Server Version6.7 Updateupdate2c
VMwareVcenter Server Version6.7 Updateupdate3
VMwareVcenter Server Version6.7 Updateupdate3a
VMwareVcenter Server Version6.7 Updateupdate3b
VMwareVcenter Server Version6.7 Updateupdate3f
VMwareVcenter Server Version6.7 Updateupdate3g
VMwareVcenter Server Version6.7 Updateupdate3j
VMwareVcenter Server Version7.0 Update-
VMwareVcenter Server Version7.0 Updatea
VMwareVcenter Server Version7.0 Updateb
VMwareVcenter Server Version7.0 Updatec
VMwareVcenter Server Version7.0 Updated
VMwareVcenter Server Version7.0 Updateupdate1
VMwareVcenter Server Version7.0 Updateupdate1a

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

VMware vCenter Server Remote Code Execution Vulnerability

Vulnerability

VMware vCenter Server vSphere Client contains a remote code execution vulnerability in a vCenter Server plugin which allows an attacker with network access to port 443 to execute commands with unrestricted privileges on the underlying operating system.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 93.74% 0.998
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.