First published: Thu Sep 23 2021(Updated: )
The vCenter Server contains an authenticated code execution vulnerability in VAMI (Virtual Appliance Management Infrastructure). An authenticated VAMI user with network access to port 5480 on vCenter Server may exploit this issue to execute code on the underlying operating system that hosts vCenter Server.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22014 is an authenticated code execution vulnerability in VAMI (Virtual Appliance Management Infrastructure) in vCenter Server.
CVE-2021-22014 affects VMware Cloud Foundation versions 3.0 to 5.0, allowing an authenticated VAMI user with network access to execute code on the underlying operating system.
CVE-2021-22014 affects VMware vCenter Server version 6.5, allowing an authenticated VAMI user with network access to execute code on the underlying operating system.
CVE-2021-22014 affects VMware vCenter Server version 6.7, allowing an authenticated VAMI user with network access to execute code on the underlying operating system.
CVE-2021-22014 affects VMware vCenter Server version 7.0, allowing an authenticated VAMI user with network access to execute code on the underlying operating system.
CVE-2021-22014 has a severity rating of 7.2 (critical).
To fix CVE-2021-22014, apply the necessary security patches or updates provided by VMware.