First published: Thu Sep 23 2021(Updated: )
The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<3.10.2.2 | |
VMware Cloud Foundation | >=4.0<4.3 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22019 is a denial-of-service vulnerability in the vCenter API service of the vCenter Server.
A malicious actor can exploit CVE-2021-22019 by sending a specially crafted jsonrpc message to the vCenter API service of the vCenter Server.
The affected software by CVE-2021-22019 includes VMware Cloud Foundation versions 3.0 through 3.10.2.2, and VMware vCenter Server versions 6.5, 6.7, and 7.0.
CVE-2021-22019 has a severity rating of 7.5 (High).
You can find more information about CVE-2021-22019 on the VMware security advisory page: https://www.vmware.com/security/advisories/VMSA-2021-0020.html