First published: Thu Sep 23 2021(Updated: )
The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22013 is a file path traversal vulnerability in vCenter Server that can lead to information disclosure.
VMware Cloud Foundation versions 3.0 to 5.0 are affected by CVE-2021-22013.
CVE-2021-22013 affects VMware vCenter Server versions 6.7 and 7.0.
CVE-2021-22013 has a severity rating of 7.5 (High).
Apply the necessary patches and updates provided by VMware to fix the vulnerability.