First published: Thu Sep 23 2021(Updated: )
The vCenter Server contains an information disclosure vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by sending a specially crafted json-rpc message to gain access to sensitive information.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22008 is an information disclosure vulnerability in the vCenter Server VAPI (vCenter API) service.
CVE-2021-22008 affects VMware Cloud Foundation versions 3.0 to 5.0.
CVE-2021-22008 impacts VMware vCenter Server version 6.5.
CVE-2021-22008 impacts VMware vCenter Server version 6.7.
CVE-2021-22008 impacts VMware vCenter Server version 7.0.
The severity of CVE-2021-22008 is high, with a CVSS score of 7.5.
An attacker with network access to port 443 on vCenter Server can exploit CVE-2021-22008 by sending a specially crafted json-rpc message to gain access to sensitive information.
You can find more information about CVE-2021-22008 in the VMware Security Advisory VMSA-2021-0020 at https://www.vmware.com/security/advisories/VMSA-2021-0020.html.