The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x prior to 7.0 U1c, 6.7 prior to 6.7 U3l and 6.5 prior to 6.5 U3n) and VMware Cloud Foundation (4.x prior to 4.2 and 3.x prior to 3.10.1.2).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vmware cloud foundation |
||
vmware vcenter server 6.5 |
||
vmware vcenter server 6.7 |
||
vmware vcenter server 7.0 |
VMware has addressed a high severity unauth RCE vulnerability in VMware View Planner, allowing attackers to abuse servers running unpatched software for remote code execution.
is a free tool for benchmarking desktop client and server-side performance in Virtual Desktop Infrastructure environments.
The vulnerability was discovered and reported to VMware by Positive Technologies web application security expert Mikhail Klyuchnikov.
According to VMware's
, the privately rep...
VMware has patched three vulnerabilities in its virtual-machine infrastructure for data centers, the most serious of which is a remote code execution (RCE) flaw in its vCenter Server management platform. The vulnerability could allow attackers to breach the external perimeter of an enterprise data center or leverage backdoors already installed on a system to find other vulnerable points of network entry to take over affected systems.
Positive Technologies researcher Mikhail Klyuchnikov dis...
VMware has addressed a critical remote code execution (RCE) vulnerability in the vCenter Server virtual infrastructure management platform that may allow attackers to potentially take control of affected systems.
vCenter Server helps IT admins manage virtualized hosts and virtual machines within enterprise environments via a single console.
The privately reported vulnerability is tracked as
, and it was rated with a
according to VMware's security
.
VMware has revealed a critical-rated bug in the HTML5 client for its flagship vSphere hybrid cloud suite.
“The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin,” says VMware’s notification. “A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.”
As vCenter Server is the tool that drives a fleet of v...
Shodan dork of CVE-2021-21972 VMware vCenter Server vSphere Client Remote Code Execution: https://www.shodan.io/search?query=http.title:%22ID_VC_Welcome%22