CVE-2021-21985
Published on: 05/26/2021 12:00:00 AM UTC
Last Modified on: 09/14/2021 05:37:00 PM UTC
Certain versions of Cloud Foundation from Vmware contain the following vulnerability:
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
- CVE-2021-21985 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 10 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
VMware vCenter Server Virtual SAN Health Check Remote Code Execution ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
VMware Security Advisory 2021-0010 ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
Access Denied | www.vmware.com text/html Inactive LinkNot Archived |
![]() |
Related QID Numbers
- 216259 VMware vCenter Server 7.0 Update 7.0 U2b Missing (VMSA-2021-0010)
- 216260 VMware vCenter Server 6.7 Update 6.7 U3n Missing (VMSA-2021-0010)
- 216261 VMware vCenter Server 6.5 Update 6.5 U3p Missing (VMSA-2021-0010)
- 730102 VMware vCenter Server Remote Code Execution (RCE) Vulnerability (VMSA-2021-0010) (UNAUTHENTICATED))
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Vmware | Cloud Foundation | All | All | All | All |
Application | Vmware | Vcenter Server | 6.5 | - | All | All |
Application | Vmware | Vcenter Server | 6.5 | 1 | All | All |
Application | Vmware | Vcenter Server | 6.5 | 1b | All | All |
Application | Vmware | Vcenter Server | 6.5 | 1c | All | All |
Application | Vmware | Vcenter Server | 6.5 | a | All | All |
Application | Vmware | Vcenter Server | 6.5 | b | All | All |
Application | Vmware | Vcenter Server | 6.5 | c | All | All |
Application | Vmware | Vcenter Server | 6.5 | d | All | All |
Application | Vmware | Vcenter Server | 6.5 | e | All | All |
Application | Vmware | Vcenter Server | 6.5 | f | All | All |
Application | Vmware | Vcenter Server | 6.5 | u1 | All | All |
Application | Vmware | Vcenter Server | 6.5 | u1b | All | All |
Application | Vmware | Vcenter Server | 6.5 | u1c | All | All |
Application | Vmware | Vcenter Server | 6.5 | u1d | All | All |
Application | Vmware | Vcenter Server | 6.5 | u1e | All | All |
Application | Vmware | Vcenter Server | 6.5 | u1g | All | All |
Application | Vmware | Vcenter Server | 6.5 | u2 | All | All |
Application | Vmware | Vcenter Server | 6.5 | u2b | All | All |
Application | Vmware | Vcenter Server | 6.5 | u2c | All | All |
Application | Vmware | Vcenter Server | 6.5 | u2d | All | All |
Application | Vmware | Vcenter Server | 6.5 | u2g | All | All |
Application | Vmware | Vcenter Server | 6.5 | u3 | All | All |
Application | Vmware | Vcenter Server | 6.5 | u3d | All | All |
Application | Vmware | Vcenter Server | 6.5 | u3f | All | All |
Application | Vmware | Vcenter Server | 6.5 | u3k | All | All |
Application | Vmware | Vcenter Server | 6.5 | u3n | All | All |
Application | Vmware | Vcenter Server | 6.5 | update1 | All | All |
Application | Vmware | Vcenter Server | 6.5 | update1b | All | All |
Application | Vmware | Vcenter Server | 6.5 | update1c | All | All |
Application | Vmware | Vcenter Server | 6.5 | update1d | All | All |
Application | Vmware | Vcenter Server | 6.5 | update1e | All | All |
Application | Vmware | Vcenter Server | 6.5 | update1g | All | All |
Application | Vmware | Vcenter Server | 6.5 | update2 | All | All |
Application | Vmware | Vcenter Server | 6.5 | update2b | All | All |
Application | Vmware | Vcenter Server | 6.5 | update2c | All | All |
Application | Vmware | Vcenter Server | 6.5 | update2d | All | All |
Application | Vmware | Vcenter Server | 6.5 | update2g | All | All |
Application | Vmware | Vcenter Server | 6.5 | update3 | All | All |
Application | Vmware | Vcenter Server | 6.5 | update3d | All | All |
Application | Vmware | Vcenter Server | 6.5 | update3f | All | All |
Application | Vmware | Vcenter Server | 6.5 | update3k | All | All |
Application | Vmware | Vcenter Server | 6.5 | update3n | All | All |
Application | Vmware | Vcenter Server | 6.7 | - | All | All |
Application | Vmware | Vcenter Server | 6.7 | a | All | All |
Application | Vmware | Vcenter Server | 6.7 | b | All | All |
Application | Vmware | Vcenter Server | 6.7 | d | All | All |
Application | Vmware | Vcenter Server | 6.7 | u1 | All | All |
Application | Vmware | Vcenter Server | 6.7 | u1b | All | All |
Application | Vmware | Vcenter Server | 6.7 | u2 | All | All |
Application | Vmware | Vcenter Server | 6.7 | u2a | All | All |
Application | Vmware | Vcenter Server | 6.7 | u2c | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3 | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3a | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3b | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3f | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3g | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3j | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3l | All | All |
Application | Vmware | Vcenter Server | 6.7 | u3m | All | All |
Application | Vmware | Vcenter Server | 6.7 | update1 | All | All |
Application | Vmware | Vcenter Server | 6.7 | update1b | All | All |
Application | Vmware | Vcenter Server | 6.7 | update2 | All | All |
Application | Vmware | Vcenter Server | 6.7 | update2a | All | All |
Application | Vmware | Vcenter Server | 6.7 | update2c | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3 | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3a | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3b | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3f | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3g | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3j | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3l | All | All |
Application | Vmware | Vcenter Server | 6.7 | update3m | All | All |
Application | Vmware | Vcenter Server | 7.0 | - | All | All |
Application | Vmware | Vcenter Server | 7.0 | a | All | All |
Application | Vmware | Vcenter Server | 7.0 | b | All | All |
Application | Vmware | Vcenter Server | 7.0 | c | All | All |
Application | Vmware | Vcenter Server | 7.0 | d | All | All |
Application | Vmware | Vcenter Server | 7.0 | u1 | All | All |
Application | Vmware | Vcenter Server | 7.0 | u1a | All | All |
Application | Vmware | Vcenter Server | 7.0 | u1c | All | All |
Application | Vmware | Vcenter Server | 7.0 | u1d | All | All |
Application | Vmware | Vcenter Server | 7.0 | u2 | All | All |
Application | Vmware | Vcenter Server | 7.0 | u2a | All | All |
Application | Vmware | Vcenter Server | 7.0 | update1 | All | All |
Application | Vmware | Vcenter Server | 7.0 | update1a | All | All |
Application | Vmware | Vcenter Server | 7.0 | update1c | All | All |
Application | Vmware | Vcenter Server | 7.0 | update1d | All | All |
Application | Vmware | Vcenter Server | 7.0 | update2 | All | All |
Application | Vmware | Vcenter Server | 7.0 | update2a | All | All |
- cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:1b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:1c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u1b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u1c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u1d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u1e:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u1g:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u2:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u2b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u2c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u2d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u2g:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u3:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u3d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u3f:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u3k:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:u3n:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u1b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u2:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u2a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u2c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3f:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3g:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3j:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3l:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:u3m:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:u1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:u1a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:u1c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:u1d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:u2:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:u2a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*:
- cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
?Skyline proactively identifies VMSA 20210010 which includes CVE CVE-2021-21985 & CVE-2021-21986. Check Skyline Adv… twitter.com/i/web/status/1… | 2021-05-25 21:10:05 |
![]() |
VMware vCenter Server updates address RCE vulnerability (9.8 - CVE-2021-21985) reddit.com/r/sysadmin/com… https://t.co/5s2CiXsn1B | 2021-05-25 22:00:35 |
![]() |
"The vulnerability is tracked as CVE-2021-21985 and has a severity score of 9.8 out of 10." | 2021-05-26 02:33:08 |
![]() |
CVE-2021-21985 "The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input vali… twitter.com/i/web/status/1… | 2021-05-26 03:07:37 |
![]() |
CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution tenable.com/blog/cve-2021-… | 2021-05-26 04:24:46 |
![]() |
統合版 JPCERT/CC | 注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) ift.tt/34k9xte #itsec_jp | 2021-05-26 04:37:19 |
![]() |
注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) izumino.jp/Security/sec_t… jpcert.or.jp/at/2021/at2100… | 2021-05-26 04:40:16 |
![]() |
注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) - JPCERT/CC注意喚起 [… twitter.com/i/web/status/1… | 2021-05-26 04:42:10 |
![]() |
VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起を公開。VMwareの情報を確認のうえ、修正済みバージョンの適用や回避策の適用をご検討ください。… twitter.com/i/web/status/1… | 2021-05-26 04:45:48 |
![]() |
VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-05-26 04:57:38 |
![]() |
A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… | 2021-05-26 05:00:14 |
![]() |
A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… | 2021-05-26 05:03:42 |
![]() |
New Security Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server ^MT jpcert.or.jp/english/at/202… | 2021-05-26 05:17:38 |
![]() |
"A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitr… twitter.com/i/web/status/1… | 2021-05-26 05:20:03 |
![]() |
A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… | 2021-05-26 05:34:14 |
![]() |
Security Alert: Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server… twitter.com/i/web/status/1… | 2021-05-26 06:01:48 |
![]() |
A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… | 2021-05-26 06:15:03 |
![]() |
A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… | 2021-05-26 06:40:01 |
![]() |
注意喚起: VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 (公開) dlvr.it/S0R2Sp https://t.co/KHNj68Sa1q | 2021-05-26 06:46:34 |
![]() |
Security Alert: Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server… twitter.com/i/web/status/1… | 2021-05-26 07:04:02 |
![]() |
The vuln CVE-2021-21985 has a tweet created 0 days ago and retweeted 17 times. twitter.com/jpcert/status/… #pow1rtrtwwcve | 2021-05-26 07:06:01 |
![]() |
The vuln CVE-2021-21985 has a tweet created 0 days ago and retweeted 13 times. twitter.com/bad_packets/st… #pow1rtrtwwcve | 2021-05-26 07:06:01 |
![]() |
Vulnerabilidad crítica en VMware vCenter Server (CVE-2021-21985) un buen RCE es-la.tenable.com/blog/cve-2021-… | 2021-05-26 07:28:30 |
![]() |
CVE-2021-21985 - Vulnerabilidad crítica en VMware vCenter Server expone sistemas afectados. noticiasseguridad.com/vulnerabilidad… | 2021-05-26 07:35:22 |
![]() |
@cyb3rops Do you mean CVE-2021–21974 or CVE-2021-21985 ? | 2021-05-26 07:50:32 |
![]() |
This one shouldn’t be confused with CVE-2021-21985 from yesterday, which also needs patching (but I can see from Sh… twitter.com/i/web/status/1… | 2021-05-26 07:52:41 |
![]() |
#VMware is urging its #vCenter users to update after a pair of #vulnerabilities (CVE-2021-21985, CVE-2021-21986) we… twitter.com/i/web/status/1… | 2021-05-26 08:25:34 |
![]() |
?Error crítico en VMware vCenter Server permite atacantes ejecutar código arbitrario #RCE - CVE-2021-21985 con pun… twitter.com/i/web/status/1… | 2021-05-26 09:13:25 |
![]() |
“VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起” htn.to/3n5xZCayAd | 2021-05-26 09:15:38 |
![]() |
#security Alert: Alert Regarding #vulnerabilities (#cve-2021-21985, #cve-2021-21986) in #vmware vCenter #server… twitter.com/i/web/status/1… | 2021-05-26 09:17:53 |
![]() |
A critical flaw — CVE-2021-21985 — has been found in VMware vCenter Server that could let attackers execute arbitra… twitter.com/i/web/status/1… | 2021-05-26 09:22:28 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… | 2021-05-26 09:34:03 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… | 2021-05-26 09:34:03 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985): VMware has patched… twitter.com/i/web/status/1… | 2021-05-26 09:34:08 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985) -… twitter.com/i/web/status/1… | 2021-05-26 09:34:09 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985): VMware has patched… twitter.com/i/web/status/1… | 2021-05-26 09:36:04 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… | 2021-05-26 09:49:06 |
![]() |
CVE-2021-21985, CVE-2021-21986: VMware vCenter Server Remote Code Execution Vulnerability Alert meterpreter.org/cve-2021-21985… #info #news #tech | 2021-05-26 09:54:45 |
![]() |
#VMware fixes critical vCenter Server RCE #vulnerability, urges immediate action (CVE-2021-21985): helpnetsecurity.com/2021/05/26/cve… #cybersecurity | 2021-05-26 09:57:20 |
![]() |
VMware fixes critical vCenter Server RCE vunerability, urges immediate action (CVE-2021-21985) itsecuritynews.info/vmware-fixes-c… | 2021-05-26 10:05:45 |
![]() |
Another critical bug impacts all #VMware #vCenter Server installs securityaffairs.co/wordpress/1182… #securityaffairs #hacking | 2021-05-26 10:09:39 |
![]() |
Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… | 2021-05-26 10:10:02 |
![]() |
VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985) dlvr.it/S0Rcdg | 2021-05-26 10:10:33 |
![]() |
VMware has patched two vulnerabilities (CVE-2021-21985, CVE-2021-21986) affecting VMware vCenter Server and is urgi… twitter.com/i/web/status/1… | 2021-05-26 10:15:34 |
![]() |
VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… | 2021-05-26 10:17:35 |
![]() |
Advice on CVE-2021-21985, a critical remote code execution in the VMware vCenter Server. Details from… twitter.com/i/web/status/1… | 2021-05-26 10:22:08 |
![]() |
CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution ow.ly/tab9102KBXK | 2021-05-26 10:33:50 |
![]() |
VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985) itsecuritynews.info/vmware-fixes-c… | 2021-05-26 10:35:36 |
![]() |
Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… | 2021-05-26 10:38:24 |
![]() |
VMware vCenter Server updates address remote code execution and authentication vulnerabilities (CVE-2021-21985, CVE… twitter.com/i/web/status/1… | 2021-05-26 10:39:31 |
![]() |
Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… #Security #CVE202121985… twitter.com/i/web/status/1… | 2021-05-26 11:01:15 |
![]() |
CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution ow.ly/jjLv102KCdo | 2021-05-26 11:22:37 |
![]() |
#vulnerability #ALERT CVE-2021-21985 is a critical vulnerability in VMware vCenter that needs to be patched immed… twitter.com/i/web/status/1… | 2021-05-26 11:30:25 |
![]() |
Awesome summary by @ClaireTills on the latest vCenter vulns tenable.com/blog/cve-2021-… | 2021-05-26 11:38:25 |
![]() |
VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985) helpnetsecurity.com/2021/05/26/cve… | 2021-05-26 11:49:38 |
![]() |
Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server jpcert.or.jp/english/at/202…… twitter.com/i/web/status/1… | 2021-05-26 12:03:24 |
![]() |
@c3rb3ru5d3d53c CVE-2021-21985 one isn’t public sadly/thankfully ? | 2021-05-26 12:12:01 |
![]() |
Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… #Infosec #Secinfo… twitter.com/i/web/status/1… | 2021-05-26 12:16:35 |
![]() |
Alert Regarding Vulnerabilities (CVE-2021-21985, CVE-2021-21986) in VMware vCenter Server jpcert.or.jp/english/at/202…… twitter.com/i/web/status/1… | 2021-05-26 12:20:37 |
![]() |
Another critical bug impacts all VMware vCenter Server installs securityaffairs.co/wordpress/1182… #Infosec #Secinfo… twitter.com/i/web/status/1… | 2021-05-26 12:23:04 |
![]() |
Patch before its too late. Ransomware will not be behind using it. CVE-2021-21985, CVE-2021-21986 vmware.com/security/advis… | 2021-05-26 12:33:44 |
![]() |
#VMware: risolte due vulnerabilità, di cui una critica, in vCenter Server (CVE-2021-21985, CVE-2021-21986) Possibi… twitter.com/i/web/status/1… | 2021-05-26 12:36:43 |
![]() |
securityaffairs.co/wordpress/1182… | 2021-05-26 12:51:06 |
![]() |
May 25 - CVE-2021-21985 was found in #vmware May 26 - issue fixed, patch is ready. Making a #shodan search - “produ… twitter.com/i/web/status/1… | 2021-05-26 13:21:34 |
![]() |
CVE-2021-21985: Critical VMware vCenter Server Remote Code Execution ow.ly/2VNf102KDQc | 2021-05-26 13:28:50 |
![]() |
VMware vCenter Serverの複数の脆弱性(CVE-2021-21985、CVE-2021-21986)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-05-26 14:07:31 |
![]() |
? #VMware warns of critical bug affecting all #vCenter Server installs (CVE-2021-21985), Meanwhile A Threat Actor i… twitter.com/i/web/status/1… | 2021-05-26 14:14:27 |
![]() |
VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985)… twitter.com/i/web/status/1… | 2021-05-26 14:20:11 |
![]() |
CVE-2021-21985 : The vSphere Client HTML5 contains a remote code execution vulnerability due to lack of input val… twitter.com/i/web/status/1… | 2021-05-26 14:43:38 |
![]() |
#News CVE-2021-21985, CVE-2021-21986: VMware vCenter Server Remote Code Execution Vulnerability Alert: On May 26, 2… twitter.com/i/web/status/1… | 2021-05-26 15:54:35 |
![]() |
VMware vCenter Server updates address RCE vulnerability (9.8 - CVE-2021-21985) | 2021-05-25 17:48:39 |
![]() |
CVE-2021-21985 | 2021-05-26 15:41:40 |
![]() |
VMware vCenter Server CVE-2021-21985/CVE-2021-21986 Exploits incoming.. | 2021-05-29 18:12:03 |
![]() |
VMware vCenter Server CVE-2021-21985 Remote Code Execution Vulnerability nmap checker script | 2021-05-31 06:46:42 |
![]() |
CVE-2021-21985 (another NSE quick checker) | 2021-05-31 05:54:38 |
![]() |
Hackers scan for VMware vCenter servers vulnerable to CVE-2021-21985 RCE | 2021-06-05 20:49:40 |
![]() |
I know nobody here would expose there vCenter to the Internet, but... | 2021-06-07 03:18:38 |
![]() |
Thousands of Vulnerable VMWare vCenter Servers Still Publicly Exposed (CVE-2021-21985, CVE-2021-21986) | Trustwave | 2021-06-16 13:34:41 |
![]() |
CVE-2021-21985 exploit activity detected today | 2021-06-28 12:46:05 |
![]() |
CISA’s Top Vulnerabilities in 2020 and 2021 - CyberHoot | 2021-08-03 16:45:38 |
![]() |
Unauthorized RCE in VMware vCenter - CVE-2021–22005 | 2021-10-30 05:40:29 |