CVE-2021-21985

Published on: 05/26/2021 12:00:00 AM UTC

Last Modified on: 09/14/2021 05:37:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Cloud Foundation from Vmware contain the following vulnerability:

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

  • CVE-2021-21985 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
VMware vCenter Server Virtual SAN Health Check Remote Code Execution ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html
VMware Security Advisory 2021-0010 ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html
Access Denied www.vmware.com
text/html
Inactive LinkNot Archived
URL Logo MISC www.vmware.com/security/advisories/VMSA-2021-0010.html

Related QID Numbers

  • 216259 VMware vCenter Server 7.0 Update 7.0 U2b Missing (VMSA-2021-0010)
  • 216260 VMware vCenter Server 6.7 Update 6.7 U3n Missing (VMSA-2021-0010)
  • 216261 VMware vCenter Server 6.5 Update 6.5 U3p Missing (VMSA-2021-0010)
  • 730102 VMware vCenter Server Remote Code Execution (RCE) Vulnerability (VMSA-2021-0010) (UNAUTHENTICATED))

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationVmwareCloud FoundationAllAllAllAll
ApplicationVmwareVcenter Server6.5-AllAll
ApplicationVmwareVcenter Server6.51AllAll
ApplicationVmwareVcenter Server6.51bAllAll
ApplicationVmwareVcenter Server6.51cAllAll
ApplicationVmwareVcenter Server6.5aAllAll
ApplicationVmwareVcenter Server6.5bAllAll
ApplicationVmwareVcenter Server6.5cAllAll
ApplicationVmwareVcenter Server6.5dAllAll
ApplicationVmwareVcenter Server6.5eAllAll
ApplicationVmwareVcenter Server6.5fAllAll
ApplicationVmwareVcenter Server6.5u1AllAll
ApplicationVmwareVcenter Server6.5u1bAllAll
ApplicationVmwareVcenter Server6.5u1cAllAll
ApplicationVmwareVcenter Server6.5u1dAllAll
ApplicationVmwareVcenter Server6.5u1eAllAll
ApplicationVmwareVcenter Server6.5u1gAllAll
ApplicationVmwareVcenter Server6.5u2AllAll
ApplicationVmwareVcenter Server6.5u2bAllAll
ApplicationVmwareVcenter Server6.5u2cAllAll
ApplicationVmwareVcenter Server6.5u2dAllAll
ApplicationVmwareVcenter Server6.5u2gAllAll
ApplicationVmwareVcenter Server6.5u3AllAll
ApplicationVmwareVcenter Server6.5u3dAllAll
ApplicationVmwareVcenter Server6.5u3fAllAll
ApplicationVmwareVcenter Server6.5u3kAllAll
ApplicationVmwareVcenter Server6.5u3nAllAll
ApplicationVmwareVcenter Server6.5update1AllAll
ApplicationVmwareVcenter Server6.5update1bAllAll
ApplicationVmwareVcenter Server6.5update1cAllAll
ApplicationVmwareVcenter Server6.5update1dAllAll
ApplicationVmwareVcenter Server6.5update1eAllAll
ApplicationVmwareVcenter Server6.5update1gAllAll
ApplicationVmwareVcenter Server6.5update2AllAll
ApplicationVmwareVcenter Server6.5update2bAllAll
ApplicationVmwareVcenter Server6.5update2cAllAll
ApplicationVmwareVcenter Server6.5update2dAllAll
ApplicationVmwareVcenter Server6.5update2gAllAll
ApplicationVmwareVcenter Server6.5update3AllAll
ApplicationVmwareVcenter Server6.5update3dAllAll
ApplicationVmwareVcenter Server6.5update3fAllAll
ApplicationVmwareVcenter Server6.5update3kAllAll
ApplicationVmwareVcenter Server6.5update3nAllAll
ApplicationVmwareVcenter Server6.7-AllAll
ApplicationVmwareVcenter Server6.7aAllAll
ApplicationVmwareVcenter Server6.7bAllAll
ApplicationVmwareVcenter Server6.7dAllAll
ApplicationVmwareVcenter Server6.7u1AllAll
ApplicationVmwareVcenter Server6.7u1bAllAll
ApplicationVmwareVcenter Server6.7u2AllAll
ApplicationVmwareVcenter Server6.7u2aAllAll
ApplicationVmwareVcenter Server6.7u2cAllAll
ApplicationVmwareVcenter Server6.7u3AllAll
ApplicationVmwareVcenter Server6.7u3aAllAll
ApplicationVmwareVcenter Server6.7u3bAllAll
ApplicationVmwareVcenter Server6.7u3fAllAll
ApplicationVmwareVcenter Server6.7u3gAllAll
ApplicationVmwareVcenter Server6.7u3jAllAll
ApplicationVmwareVcenter Server6.7u3lAllAll
ApplicationVmwareVcenter Server6.7u3mAllAll
ApplicationVmwareVcenter Server6.7update1AllAll
ApplicationVmwareVcenter Server6.7update1bAllAll
ApplicationVmwareVcenter Server6.7update2AllAll
ApplicationVmwareVcenter Server6.7update2aAllAll
ApplicationVmwareVcenter Server6.7update2cAllAll
ApplicationVmwareVcenter Server6.7update3AllAll
ApplicationVmwareVcenter Server6.7update3aAllAll
ApplicationVmwareVcenter Server6.7update3bAllAll
ApplicationVmwareVcenter Server6.7update3fAllAll
ApplicationVmwareVcenter Server6.7update3gAllAll
ApplicationVmwareVcenter Server6.7update3jAllAll
ApplicationVmwareVcenter Server6.7update3lAllAll
ApplicationVmwareVcenter Server6.7update3mAllAll
ApplicationVmwareVcenter Server7.0-AllAll
ApplicationVmwareVcenter Server7.0aAllAll
ApplicationVmwareVcenter Server7.0bAllAll
ApplicationVmwareVcenter Server7.0cAllAll
ApplicationVmwareVcenter Server7.0dAllAll
ApplicationVmwareVcenter Server7.0u1AllAll
ApplicationVmwareVcenter Server7.0u1aAllAll
ApplicationVmwareVcenter Server7.0u1cAllAll
ApplicationVmwareVcenter Server7.0u1dAllAll
ApplicationVmwareVcenter Server7.0u2AllAll
ApplicationVmwareVcenter Server7.0u2aAllAll
ApplicationVmwareVcenter Server7.0update1AllAll
ApplicationVmwareVcenter Server7.0update1aAllAll
ApplicationVmwareVcenter Server7.0update1cAllAll
ApplicationVmwareVcenter Server7.0update1dAllAll
ApplicationVmwareVcenter Server7.0update2AllAll
ApplicationVmwareVcenter Server7.0update2aAllAll
  • cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:1b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:1c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u1b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u1c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u1d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u1e:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u1g:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u2b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u2c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u2d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u2g:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u3:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u3d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u3f:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u3k:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:u3n:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u1b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u2a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u2c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3f:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3g:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3j:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3l:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:u3m:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:u1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:u1a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:u1c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:u1d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:u2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:u2a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @VMwareSkyline ?Skyline proactively identifies VMSA 20210010 which includes CVE CVE-2021-21985 & CVE-2021-21986. Check Skyline Adv… twitter.com/i/web/status/1… 2021-05-25 21:10:05
Twitter Icon @rsysadmin VMware vCenter Server updates address RCE vulnerability (9.8 - CVE-2021-21985) reddit.com/r/sysadmin/com… https://t.co/5s2CiXsn1B 2021-05-25 22:00:35
Twitter Icon @ohhara_shiojiri "The vulnerability is tracked as CVE-2021-21985 and has a severity score of 9.8 out of 10." 2021-05-26 02:33:08
Twitter Icon @bad_packets CVE-2021-21985 "The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input vali… twitter.com/i/web/status/1… 2021-05-26 03:07:37
Twitter Icon @athlonz CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution tenable.com/blog/cve-2021-… 2021-05-26 04:24:46
Twitter Icon @itsec_jp 統合版 JPCERT/CC | 注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) ift.tt/34k9xte #itsec_jp 2021-05-26 04:37:19
Twitter Icon @sec_trend 注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) izumino.jp/Security/sec_t… jpcert.or.jp/at/2021/at2100… 2021-05-26 04:40:16
Twitter Icon @securenews_web 注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) - JPCERT/CC注意喚起 [… twitter.com/i/web/status/1… 2021-05-26 04:42:10
Twitter Icon @jpcert VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起を公開。VMwareの情報を確認のうえ、修正済みバージョンの適用や回避策の適用をご検討ください。… twitter.com/i/web/status/1… 2021-05-26 04:45:48
Twitter Icon @ohhara_shiojiri VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 jpcert.or.jp/at/2021/at2100… 2021-05-26 04:57:38
Twitter Icon @TheHackersNews A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… 2021-05-26 05:00:14
Twitter Icon @Swati_THN A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… 2021-05-26 05:03:42
Twitter Icon @jpcert_en New Security Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server ^MT jpcert.or.jp/english/at/202… 2021-05-26 05:17:38
Twitter Icon @trip_elix "A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitr… twitter.com/i/web/status/1… 2021-05-26 05:20:03
Twitter Icon @YourAnonRiots A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… 2021-05-26 05:34:14
Twitter Icon @cyberdian_cert Security Alert: Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server… twitter.com/i/web/status/1… 2021-05-26 06:01:48
Twitter Icon @security_wang A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… 2021-05-26 06:15:03
Twitter Icon @unix_root A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… 2021-05-26 06:40:01
Twitter Icon @TokyoSec 注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) dlvr.it/S0R2Sp https://t.co/KHNj68Sa1q 2021-05-26 06:46:34
Twitter Icon @NaveedHamid Security Alert: Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server… twitter.com/i/web/status/1… 2021-05-26 07:04:02
Twitter Icon @ipssignatures The vuln CVE-2021-21985 has a tweet created 0 days ago and retweeted 17 times. twitter.com/jpcert/status/… #pow1rtrtwwcve 2021-05-26 07:06:01
Twitter Icon @ipssignatures The vuln CVE-2021-21985 has a tweet created 0 days ago and retweeted 13 times. twitter.com/bad_packets/st… #pow1rtrtwwcve 2021-05-26 07:06:01
Twitter Icon @mvp_java Vulnerabilidad crítica en VMware vCenter Server (CVE-2021-21985) un buen RCE es-la.tenable.com/blog/cve-2021-… 2021-05-26 07:28:30
Twitter Icon @ciberconsejo CVE-2021-21985 - Vulnerabilidad crítica en VMware vCenter Server expone sistemas afectados. noticiasseguridad.com/vulnerabilidad… 2021-05-26 07:35:22
Twitter Icon @Gl3bGl4z @cyb3rops Do you mean CVE-2021–21974 or CVE-2021-21985 ? 2021-05-26 07:50:32
Twitter Icon @GossiTheDog This one shouldn’t be confused with CVE-2021-21985 from yesterday, which also needs patching (but I can see from Sh… twitter.com/i/web/status/1… 2021-05-26 07:52:41
Twitter Icon @twelvesec #VMware is urging its #vCenter users to update after a pair of #vulnerabilities (CVE-2021-21985, CVE-2021-21986) we… twitter.com/i/web/status/1… 2021-05-26 08:25:34
Twitter Icon @elhackernet ?Error crítico en VMware vCenter Server permite atacantes ejecutar código arbitrario #RCE - CVE-2021-21985 con pun… twitter.com/i/web/status/1… 2021-05-26 09:13:25
Twitter Icon @labunix “VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起” htn.to/3n5xZCayAd 2021-05-26 09:15:38
Twitter Icon @malware_devil #security Alert: Alert Regarding #vulnerabilities (#cve-2021-21985, #cve-2021-21986) in #vmware vCenter #server… twitter.com/i/web/status/1… 2021-05-26 09:17:53
Twitter Icon @AlirezaGhahrood A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… 2021-05-26 09:22:28
Twitter Icon @SofiaITC VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… 2021-05-26 09:34:03
Twitter Icon @jtruglio VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… 2021-05-26 09:34:03
Twitter Icon @shah_sheikh VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985): VMware has patched… twitter.com/i/web/status/1… 2021-05-26 09:34:08
Twitter Icon @helpnetsecurity VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985) -… twitter.com/i/web/status/1… 2021-05-26 09:34:09
Twitter Icon @cipherstorm VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985): VMware has patched… twitter.com/i/web/status/1… 2021-05-26 09:36:04
Twitter Icon @DeepFriedCyber VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… 2021-05-26 09:49:06
Twitter Icon @the_yellow_fall CVE-2021-21985, CVE-2021-21986: VMware vCenter Server Remote Code Execution Vulnerability Alert meterpreter.org/cve-2021-21985… #info #news #tech 2021-05-26 09:54:45
Twitter Icon @immuniweb #VMware fixes critical vCenter Server RCE #vulnerability, urges immediate action (CVE-2021-21985): helpnetsecurity.com/2021/05/26/cve… #cybersecurity 2021-05-26 09:57:20
Twitter Icon @IT_securitynews VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985) itsecuritynews.info/vmware-fixes-c… 2021-05-26 10:05:45
Twitter Icon @securityaffairs Another critical bug impacts all #VMware #vCenter Server installs securityaffairs.co/wordpress/1182… #securityaffairs #hacking 2021-05-26 10:09:39
Twitter Icon @thedpsadvisors Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… 2021-05-26 10:10:02
Twitter Icon @Xc0resecurity VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985) dlvr.it/S0Rcdg 2021-05-26 10:10:33
Twitter Icon @kloudfyre VMware has patched two vulnerabilities (CVE-2021-21985, CVE-2021-21986) affecting VMware vCenter Server and is urgi… twitter.com/i/web/status/1… 2021-05-26 10:15:34
Twitter Icon @gzunigah VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… 2021-05-26 10:17:35
Twitter Icon @DanRaywood Advice on CVE-2021-21985, a critical remote code execution in the VMware vCenter Server. Details from… twitter.com/i/web/status/1… 2021-05-26 10:22:08
Twitter Icon @AlicePintori CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution ow.ly/tab9102KBXK 2021-05-26 10:33:50
Twitter Icon @IT_securitynews VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985) itsecuritynews.info/vmware-fixes-c… 2021-05-26 10:35:36
Twitter Icon @security_inside Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… 2021-05-26 10:38:24
Twitter Icon @partikelchen VMware vCenter Server updates address remote code execution and authentication vulnerabilities (CVE-2021-21985, CVE… twitter.com/i/web/status/1… 2021-05-26 10:39:31
Twitter Icon @LudovicoLoreti Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… #Security #CVE202121985… twitter.com/i/web/status/1… 2021-05-26 11:01:15
Twitter Icon @Art_Capella CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution ow.ly/jjLv102KCdo 2021-05-26 11:22:37
Twitter Icon @STechForum #vulnerability #ALERT CVE-2021-21985 is a critical vulnerability in VMware vCenter that needs to be patched immed… twitter.com/i/web/status/1… 2021-05-26 11:30:25
Twitter Icon @SeanWrightSec Awesome summary by @ClaireTills on the latest vCenter vulns tenable.com/blog/cve-2021-… 2021-05-26 11:38:25
Twitter Icon @Whitehead4Jeff VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985) helpnetsecurity.com/2021/05/26/cve… 2021-05-26 11:49:38
Twitter Icon @ReneRobichaud Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server jpcert.or.jp/english/at/202…twitter.com/i/web/status/1… 2021-05-26 12:03:24
Twitter Icon @GossiTheDog @c3rb3ru5d3d53c CVE-2021-21985 one isn’t public sadly/thankfully ? 2021-05-26 12:12:01
Twitter Icon @ReneRobichaud Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… #Infosec #Secinfo… twitter.com/i/web/status/1… 2021-05-26 12:16:35
Twitter Icon @CeptBiro Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server jpcert.or.jp/english/at/202…twitter.com/i/web/status/1… 2021-05-26 12:20:37
Twitter Icon @CeptBiro Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… #Infosec #Secinfo… twitter.com/i/web/status/1… 2021-05-26 12:23:04
Twitter Icon @AjayPS29 Patch before its too late. Ransomware will not be behind using it. CVE-2021-21985, CVE-2021-21986 vmware.com/security/advis… 2021-05-26 12:33:44
Twitter Icon @csirt_it #VMware: risolte due vulnerabilità, di cui una critica, in vCenter Server (CVE-2021-21985, CVE-2021-21986) Possibi… twitter.com/i/web/status/1… 2021-05-26 12:36:43
Twitter Icon @pseudonyme_ovb securityaffairs.co/wordpress/1182… 2021-05-26 12:51:06
Twitter Icon @BobbyNiko May 25 - CVE-2021-21985 was found in #vmware May 26 - issue fixed, patch is ready. Making a #shodan search - “produ… twitter.com/i/web/status/1… 2021-05-26 13:21:34
Twitter Icon @BullStallcup CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution ow.ly/2VNf102KDQc 2021-05-26 13:28:50
Twitter Icon @nekochanSec555 VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 jpcert.or.jp/at/2021/at2100… 2021-05-26 14:07:31
Twitter Icon @ido_cohen2 ? #VMware warns of critical bug affecting all #vCenter Server installs (CVE-2021-21985), Meanwhile A Threat Actor i… twitter.com/i/web/status/1… 2021-05-26 14:14:27
Twitter Icon @InfoSecHotSpot VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… 2021-05-26 14:20:11
Twitter Icon @CVEreport CVE-2021-21985 : The vSphere Client HTML5 contains a remote code execution vulnerability due to lack of input val… twitter.com/i/web/status/1… 2021-05-26 14:43:38
Twitter Icon @morodog #News CVE-2021-21985, CVE-2021-21986: VMware vCenter Server Remote Code Execution Vulnerability Alert: On May 26, 2… twitter.com/i/web/status/1… 2021-05-26 15:54:35
Reddit Logo Icon /r/sysadmin VMware vCenter Server updates address RCE vulnerability (9.8 - CVE-2021-21985) 2021-05-25 17:48:39
Reddit Logo Icon /r/netcve CVE-2021-21985 2021-05-26 15:41:40
Reddit Logo Icon /r/blueteamsec VMware vCenter Server CVE-2021-21985/CVE-2021-21986 Exploits incoming.. 2021-05-29 18:12:03
Reddit Logo Icon /r/blueteamsec VMware vCenter Server CVE-2021-21985 Remote Code Execution Vulnerability nmap checker script 2021-05-31 06:46:42
Reddit Logo Icon /r/netsec CVE-2021-21985 (another NSE quick checker) 2021-05-31 05:54:38
Reddit Logo Icon /r/InfoSecNews Hackers scan for VMware vCenter servers vulnerable to CVE-2021-21985 RCE 2021-06-05 20:49:40
Reddit Logo Icon /r/sysadmin I know nobody here would expose there vCenter to the Internet, but... 2021-06-07 03:18:38
Reddit Logo Icon /r/devopsish Thousands of Vulnerable VMWare vCenter Servers Still Publicly Exposed (CVE-2021-21985, CVE-2021-21986) | Trustwave 2021-06-16 13:34:41
Reddit Logo Icon /r/esxi CVE-2021-21985 exploit activity detected today 2021-06-28 12:46:05
Reddit Logo Icon /r/u/CyberHoot CISA’s Top Vulnerabilities in 2020 and 2021 - CyberHoot 2021-08-03 16:45:38
Reddit Logo Icon /r/TutorialBoy Unauthorized RCE in VMware vCenter - CVE-2021–22005 2021-10-30 05:40:29
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report