← Back to CVEs
CVE-2021-21973
MEDIUMCISA KEV5.3
Description
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CVE Details
CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/24/2021
Last Modified10/30/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorVMware
ProductvCenter Server and Cloud Foundation
Vulnerability NameVMware vCenter Server and Cloud Foundation Server Side Request Forgery (SSRF) Vulnerability
KEV Date Added2022-03-07
Remediation Due Date2022-03-21
Ransomware UseUnknown
Affected Products
vmware:cloud_foundationvmware:vcenter_server
Weaknesses (CWE)
CWE-918CWE-918
References
https://www.vmware.com/security/advisories/VMSA-2021-0002.html(security@vmware.com)
https://www.vmware.com/security/advisories/VMSA-2021-0002.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21973(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.