7.5
CVSSv3

CVE-2021-21980

Published: 24/11/2021 Updated: 12/07/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware vcenter server 6.5

vmware vcenter server 6.7

vmware cloud foundation 3.0

Github Repositories

A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.

westone-CVE-2022-1388-scanner Undisclosed requests may bypass iControl REST authentication Installation & Usage git clone githubcom/Osyanina/westone-CVE-2021-21980-scannergit cd westone-CVE-2022-1388-scanner cmd CVE-2022-1388exe

A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.

westone-CVE-2021-21980-scanner VMware vCenter earlier versions (70200100) has unauthorized arbitrary file read + ssrf + xss vulnerability Installation & Usage git clone githubcom/Osyanina/westone-CVE-2021-21980-scannergit cd westone-CVE-2021-21980-scanner cmd CVE-2021-21980exe

vcenter AMF object deserialization exploit

LongTail-AMF Vcenter AMF object deserialization exploit Requirement githubcom/RandomRobbieBF/marshalsec-jar Usage python3 longtailpy targetip targetport attackip attackerport Authors • D0rkerDevil • wabafet1 This is for educational purposes, Authors are not responsible for any damages Reference attackerkbcom/