vulnerability
VMware vCenter Server: CVE-2021-21985 (VMSA-2021-0010)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | May 26, 2021 | Jul 25, 2022 | Jan 20, 2026 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
May 26, 2021
Added
Jul 25, 2022
Modified
Jan 20, 2026
Description
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Solution
vmware-vcenter-server-upgrade-latest
References
- CVE-2021-21985
- https://attackerkb.com/topics/CVE-2021-21985
- URL-http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html
- URL-http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html
- URL-https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23602
- CWE-20
- CWE-470
- CWE-918
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.