#VU53595 Input validation error in vCenter Server and Cloud Foundation - CVE-2021-21985
Published: May 26, 2021 / Updated: February 20, 2022
vCenter Server
Cloud Foundation
VMware, Inc
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input within the Virtual SAN Health Check plug-in, which is enabled by default. A remote non-authenticated attacker can send a specially crafted HTTP request to the vSphere Client available at port 443/tcp and execute arbitrary commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.