The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: vmware
Published: 2021-05-26T14:04:30
Updated: 2024-08-03T18:30:23.663Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21985
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-05-26T15:15:07.937
Modified: 2024-11-21T05:49:22.407
Link: CVE-2021-21985
Redhat
No data.