First published: Thu Feb 11 2021(Updated: )
vSphere Replication 8.3.x prior to 8.3.1.2, 8.2.x prior to 8.2.1.1, 8.1.x prior to 8.1.2.3 and 6.5.x prior to 6.5.1.5 contain a post-authentication command injection vulnerability which may allow an authenticated admin user to perform a remote code execution.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Vsphere Replication | >=6.5.0<6.5.1.5 | |
Vmware Vsphere Replication | >=8.1.0<8.1.2.3 | |
Vmware Vsphere Replication | >=8.2.0<8.2.1.1 | |
Vmware Vsphere Replication | >=8.3.0<8.3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21976 is a critical vulnerability that allows authenticated admin users to perform remote code execution.
CVE-2021-21976 affects vSphere Replication versions 6.5.x prior to 6.5.1.5, 8.1.x prior to 8.1.2.3, 8.2.x prior to 8.2.1.1, and 8.3.x prior to 8.3.1.2.
To fix CVE-2021-21976, you should upgrade to the patched versions of vSphere Replication that are specified in the VMware security advisory.
Only authenticated admin users can exploit the CVE-2021-21976 vulnerability to perform remote code execution.
Yes, a patch is available for CVE-2021-21976 in the updated versions of vSphere Replication.