TROYANOSYVIRUS
Volver a CVEs

CVE-2021-21985

CRITICALCISA KEV
9.8

Descripcion

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/26/2021
Ultima modificacion10/30/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorVMware
ProductovCenter Server
Nombre vulnerabilidadVMware vCenter Server Improper Input Validation Vulnerability
Fecha inclusion KEV2021-11-03
Fecha limite remediacion2021-11-17
Uso en ransomwareKnown

Productos afectados

vmware:cloud_foundationvmware:vcenter_server

Debilidades (CWE)

CWE-918CWE-20CWE-470CWE-918

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.