[CVE-2021-21985] VMware vCenter Server Improper Input Validation Vulnerability

SecurityDesk
2021.11.03 00:00 조회 23

CISA KEV 정보

취약점명VMware vCenter Server Improper Input Validation Vulnerability
설명VMware vSphere Client contains an improper input validation vulnerability in the Virtual SAN Health Check plug-in, which is enabled by default in vCenter Server, which allows for remote code execution.
조치사항Apply updates per vendor instructions.
랜섬웨어 캠페인 악용Known
CWECWE-20 | CWE-470 | CWE-918
등록일 (KEV)2021-11-03
조치 기한2021-11-17
추가 참고https://nvd.nist.gov/vuln/detail/CVE-2021-21985

NVD 상세 정보

CVSS v3.1: 9.8 CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0: 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C

설명: The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

CWE: CWE-918 | CWE-20 | CWE-470 | CWE-918

참조

This product uses the NVD API but is not endorsed or certified by the NVD.



바로 가기

IT 도구 서랍

→ Unix: 2025-01-15T09:30:00
→ 날짜: 1736934600

→ ASCII: ABC
→ 문자: 65 66 67

ASCII 코드표 — 클릭하면 입력란에 추가

DecHex약어설명
DecHex문자
DecHex문자

→ 유니코드: 홍길동
→ 문자: \ud64d\uae38\ub3d9