First published: Wed Sep 22 2021(Updated: )
The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service condition on the vCenter Server host.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<3.10.2.2 | |
VMware Cloud Foundation | >=4.0<4.3 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.5-a | |
VMware vCenter Server | =6.5-b | |
VMware vCenter Server | =6.5-c | |
VMware vCenter Server | =6.5-d | |
VMware vCenter Server | =6.5-e | |
VMware vCenter Server | =6.5-f | |
VMware vCenter Server | =6.5-update1 | |
VMware vCenter Server | =6.5-update1b | |
VMware vCenter Server | =6.5-update1c | |
VMware vCenter Server | =6.5-update1d | |
VMware vCenter Server | =6.5-update1e | |
VMware vCenter Server | =6.5-update1g | |
VMware vCenter Server | =6.5-update2 | |
VMware vCenter Server | =6.5-update2b | |
VMware vCenter Server | =6.5-update2c | |
VMware vCenter Server | =6.5-update2d | |
VMware vCenter Server | =6.5-update2g | |
VMware vCenter Server | =6.5-update3 | |
VMware vCenter Server | =6.5-update3d | |
VMware vCenter Server | =6.5-update3f | |
VMware vCenter Server | =6.5-update3k | |
VMware vCenter Server | =6.5-update3n | |
VMware vCenter Server | =6.5-update3p | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =6.7-a | |
VMware vCenter Server | =6.7-b | |
VMware vCenter Server | =6.7-d | |
VMware vCenter Server | =6.7-update1 | |
VMware vCenter Server | =6.7-update1b | |
VMware vCenter Server | =6.7-update2 | |
VMware vCenter Server | =6.7-update2a | |
VMware vCenter Server | =6.7-update2c | |
VMware vCenter Server | =6.7-update3 | |
VMware vCenter Server | =6.7-update3a | |
VMware vCenter Server | =6.7-update3b | |
VMware vCenter Server | =6.7-update3f | |
VMware vCenter Server | =6.7-update3g | |
VMware vCenter Server | =6.7-update3j | |
VMware vCenter Server | =6.7-update3l | |
VMware vCenter Server | =6.7-update3m | |
VMware vCenter Server | =6.7-update3n | |
VMware vCenter Server | =7.0 | |
VMware vCenter Server | =7.0-a | |
VMware vCenter Server | =7.0-b | |
VMware vCenter Server | =7.0-c | |
VMware vCenter Server | =7.0-d | |
VMware vCenter Server | =7.0-update1 | |
VMware vCenter Server | =7.0-update1a | |
VMware vCenter Server | =7.0-update1c | |
VMware vCenter Server | =7.0-update1d | |
VMware vCenter Server | =7.0-update2 | |
VMware vCenter Server | =7.0-update2a | |
VMware vCenter Server | =7.0-update2b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21992 is a denial-of-service vulnerability in the vCenter Server due to improper XML entity parsing.
CVE-2021-21992 affects VMware Cloud Foundation and VMware vCenter Server versions 6.5, 6.7, and 7.0.
The severity of CVE-2021-21992 is medium with a CVSS score of 6.5.
A malicious actor with non-administrative user access to the vCenter Server vSphere Client or vCenter Server vSphere Web Client can exploit CVE-2021-21992.
VMware has released patches and recommends upgrading to the fixed versions mentioned in the advisory (https://www.vmware.com/security/advisories/VMSA-2021-0020.html).