10

CVE-2021-21985

Warnung
Exploit

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VMwareVcenter Server Version6.5 Update-
VMwareVcenter Server Version6.5 Updatea
VMwareVcenter Server Version6.5 Updateb
VMwareVcenter Server Version6.5 Updatec
VMwareVcenter Server Version6.5 Updated
VMwareVcenter Server Version6.5 Updatee
VMwareVcenter Server Version6.5 Updatef
VMwareVcenter Server Version6.5 Updateupdate1
VMwareVcenter Server Version6.5 Updateupdate1b
VMwareVcenter Server Version6.5 Updateupdate1c
VMwareVcenter Server Version6.5 Updateupdate1d
VMwareVcenter Server Version6.5 Updateupdate1e
VMwareVcenter Server Version6.5 Updateupdate1g
VMwareVcenter Server Version6.5 Updateupdate2
VMwareVcenter Server Version6.5 Updateupdate2b
VMwareVcenter Server Version6.5 Updateupdate2c
VMwareVcenter Server Version6.5 Updateupdate2d
VMwareVcenter Server Version6.5 Updateupdate2g
VMwareVcenter Server Version6.5 Updateupdate3
VMwareVcenter Server Version6.5 Updateupdate3d
VMwareVcenter Server Version6.5 Updateupdate3f
VMwareVcenter Server Version6.5 Updateupdate3k
VMwareVcenter Server Version6.5 Updateupdate3n
VMwareVcenter Server Version6.7 Update-
VMwareVcenter Server Version6.7 Updatea
VMwareVcenter Server Version6.7 Updateb
VMwareVcenter Server Version6.7 Updated
VMwareVcenter Server Version6.7 Updateupdate1
VMwareVcenter Server Version6.7 Updateupdate1b
VMwareVcenter Server Version6.7 Updateupdate2
VMwareVcenter Server Version6.7 Updateupdate2a
VMwareVcenter Server Version6.7 Updateupdate2c
VMwareVcenter Server Version6.7 Updateupdate3
VMwareVcenter Server Version6.7 Updateupdate3a
VMwareVcenter Server Version6.7 Updateupdate3b
VMwareVcenter Server Version6.7 Updateupdate3f
VMwareVcenter Server Version6.7 Updateupdate3g
VMwareVcenter Server Version6.7 Updateupdate3j
VMwareVcenter Server Version6.7 Updateupdate3l
VMwareVcenter Server Version6.7 Updateupdate3m
VMwareVcenter Server Version7.0 Update-
VMwareVcenter Server Version7.0 Updatea
VMwareVcenter Server Version7.0 Updateb
VMwareVcenter Server Version7.0 Updatec
VMwareVcenter Server Version7.0 Updated
VMwareVcenter Server Version7.0 Updateupdate1
VMwareVcenter Server Version7.0 Updateupdate1a
VMwareVcenter Server Version7.0 Updateupdate1c
VMwareVcenter Server Version7.0 Updateupdate1d
VMwareVcenter Server Version7.0 Updateupdate2
VMwareVcenter Server Version7.0 Updateupdate2a
VMwareCloud Foundation Version >= 3.0 < 3.10.2.1
VMwareCloud Foundation Version >= 4.0 < 4.2.1

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

VMware vCenter Server Improper Input Validation Vulnerability

Schwachstelle

VMware vSphere Client contains an improper input validation vulnerability in the Virtual SAN Health Check plug-in, which is enabled by default in vCenter Server, which allows for remote code execution.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.37% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

CWE-918 Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.