<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Security Advisory VMSA-2021-0002

VMSA-2021-0002VMware ESXi and vCenter Server updates address multiple security vulnerabilities.

A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. 

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.

Impacted Products

  • VMware ESXi
  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)

Recommended Solution

Upgrade to VMware vCenter Server 6.5 U3n, 6.7 U3l, 7.0 U1c or later or apply the workaround mentioned in the advisory.

If you have any questions regarding this vulnerability, please contact us.

Topics from this Article

CVE, Vulnerability Management, Threat Intelligence, Threat Analysis, VMware

Datashield
Datashield
Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

The Difference Between Cybersecurity & Network Security

The Difference Between Cybersecurity & Network Security

Security Advisory Kaseya VSA

Datashield Security Advisory:

Security Advisory Vulnerability CVE-2021-1675

Datashield Security Advisory: