The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
History

Tue, 04 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-02-04T15:38:01.759Z

Reserved: 2021-01-04T00:00:00.000Z

Link: CVE-2021-21972

cve-icon Vulnrichment

Updated: 2024-08-03T18:30:23.615Z

cve-icon NVD

Status : Modified

Published: 2021-02-24T17:15:15.833

Modified: 2025-02-04T16:15:32.760

Link: CVE-2021-21972

cve-icon Redhat

No data.