Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Multiple Vulnerabilities in VMware vCenter Server and Cloud Foundation

Issued: 
Thursday, 27 May, 2021
Last Revision: 
Thursday, 27 May, 2021
Vendor: 
Severity Level: 
Summary: 

VMware has released security updates addressing two vulnerabilities affecting VMware vCenter server and VMware Cloud Foundation, which have been listed as CVE-2021-21985 and CVE-2021-21986

 

CVE-2021-21985 is a remote code execution vulnerability affecting vSphere Client (HTML5), caused by a lack of input validation in the Virtual SAN Health Check plugin, which is enabled by default in vCenter Server. If exploited, this vulnerability could allow unauthenticated attackers to execute code on affected systems.

 

CVE-2021-21986 is an authentication mechanism issue in vSphere Client (HTML5) caused by missing authentication in Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plugins. If exploited successfully, this vulnerability could allow unauthenticated users to perform unauthorized actions allowed by the impacted plugins.

 
Recommendation: 

It is recommended to apply the latest security updates for VMware vCenter Server and VMware Cloud Foundation, which can be found at the link below, along with a blog post that VMware published to clarify on the subject:

 

 

VMware released an article on how to disable plugins, which could be used as a temporary mitigation measure until updates are applied: