By                                                     Chris Duckett

Patch immediately: VMware warns of critical remote code execution hole in vCenter

submited by
Style Pass
2021-05-26 17:30:04

By Chris Duckett | May 26, 2021 -- 01:15 GMT (18:15 PDT) | Topic: Security

VMware is urging its vCenter users to update vCenter Server versions 6.5, 6.7, and 7.0 immediately, after a pair of vulnerabilities were reported privately to the company.

The most pressing is CVE-2021-21985, which relates to a remote code execution vulnerability in a vSAN plugin enabled by default in vCenter that an attacker could use to run whatever they wished on the underlying host machine, provided they can access port 443.

"The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server," VMware described the issue in an advisory.

Leave a Comment