First published: Thu Sep 23 2021(Updated: )
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vCenter Server vulnerability is CVE-2021-22010.
The severity level of CVE-2021-22010 is high with a value of 7.5.
A malicious actor with network access to port 443 on vCenter Server can exploit CVE-2021-22010 to create a denial of service condition due to excessive memory consumption by VPXD service.
VMware vCenter Server 6.7 and VMware vCenter Server 7.0 are affected by CVE-2021-22010.
You can find more information about CVE-2021-22010 at the following link: [VMware Security Advisory VMSA-2021-0020](https://www.vmware.com/security/advisories/VMSA-2021-0020.html)