First published: Thu Sep 23 2021(Updated: )
vCenter Server contains an unauthenticated API endpoint vulnerability in vCenter Server Content Library. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to perform unauthenticated VM network setting manipulation.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-22011.
The title of this vulnerability is 'vCenter Server contains an unauthenticated API endpoint vulnerability in vCenter Server Content Library.'
The severity of CVE-2021-22011 is medium.
Versions 3.0 to 5.0 of VMware Cloud Foundation are affected by this vulnerability.
A malicious actor with network access to port 443 on vCenter Server can exploit this vulnerability to perform unauthenticated VM network setting manipulation.