← Volver a CVEs
CVE-2021-21985
CRITICALCISA KEV9.8
Descripcion
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/26/2021
Ultima modificacion10/30/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorVMware
ProductovCenter Server
Nombre vulnerabilidadVMware vCenter Server Improper Input Validation Vulnerability
Fecha inclusion KEV2021-11-03
Fecha limite remediacion2021-11-17
Uso en ransomwareKnown
Productos afectados
vmware:cloud_foundationvmware:vcenter_server
Debilidades (CWE)
CWE-918CWE-20CWE-470CWE-918
Referencias
http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html(security@vmware.com)
http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html(security@vmware.com)
https://www.vmware.com/security/advisories/VMSA-2021-0010.html(security@vmware.com)
http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.vmware.com/security/advisories/VMSA-2021-0010.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21985(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.