The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 29 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-470 CWE-918 |

Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-01-29T17:57:16.287Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21985

Updated: 2024-08-03T18:30:23.663Z

Status : Modified
Published: 2021-05-26T15:15:07.937
Modified: 2025-01-29T18:15:39.330
Link: CVE-2021-21985

No data.