First published: Thu Sep 23 2021(Updated: )
The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 | |
>=3.0<5.0 | ||
=6.5 | ||
=6.7 | ||
=7.0 | ||
VMware vCenter Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22005 is a vulnerability in VMware vCenter Server that allows an attacker to execute code on the server by uploading a specially crafted file.
CVE-2021-22005 has a severity rating of 9.8 (critical).
VMware vCenter Server versions 6.5, 6.7, and 7.0, as well as VMware Cloud Foundation versions 3.0 to 5.0, are affected by CVE-2021-22005.
An attacker with network access to port 443 on vCenter Server can exploit CVE-2021-22005 by uploading a specially crafted file.
Yes, you can find more information about CVE-2021-22005 at the following links: [Packet Storm](http://packetstormsecurity.com/files/164439/VMware-vCenter-Server-Analytics-CEIP-Service-File-Upload.html) and [VMware Security Advisories](https://www.vmware.com/security/advisories/VMSA-2021-0020.html).