CVE-2021-21991

Summary

CVECVE-2021-21991
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-09-22 19:15:00 UTC
Updated2022-07-12 17:42:00 UTC
DescriptionThe vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Vmware Cloud Foundation All All All All
Application Vmware Vcenter Server 6.5 - All All
Application Vmware Vcenter Server 6.5 a All All
Application Vmware Vcenter Server 6.5 b All All
Application Vmware Vcenter Server 6.5 c All All
Application Vmware Vcenter Server 6.5 d All All
Application Vmware Vcenter Server 6.5 e All All
Application Vmware Vcenter Server 6.5 f All All
Application Vmware Vcenter Server 6.5 update1 All All
Application Vmware Vcenter Server 6.5 update1b All All
Application Vmware Vcenter Server 6.5 update1c All All
Application Vmware Vcenter Server 6.5 update1d All All
Application Vmware Vcenter Server 6.5 update1e All All
Application Vmware Vcenter Server 6.5 update1g All All
Application Vmware Vcenter Server 6.5 update2 All All
Application Vmware Vcenter Server 6.5 update2b All All
Application Vmware Vcenter Server 6.5 update2c All All
Application Vmware Vcenter Server 6.5 update2d All All
Application Vmware Vcenter Server 6.5 update2g All All
Application Vmware Vcenter Server 6.5 update3 All All
Application Vmware Vcenter Server 6.5 update3d All All
Application Vmware Vcenter Server 6.5 update3f All All
Application Vmware Vcenter Server 6.5 update3k All All
Application Vmware Vcenter Server 6.5 update3n All All
Application Vmware Vcenter Server 6.5 update3p All All
Application Vmware Vcenter Server 6.7 All All All
Application Vmware Vcenter Server 6.7 - All All
Application Vmware Vcenter Server 6.7 a All All
Application Vmware Vcenter Server 6.7 b All All
Application Vmware Vcenter Server 6.7 d All All
Application Vmware Vcenter Server 6.7 update1 All All
Application Vmware Vcenter Server 6.7 update1b All All
Application Vmware Vcenter Server 6.7 update2 All All
Application Vmware Vcenter Server 6.7 update2a All All
Application Vmware Vcenter Server 6.7 update2c All All
Application Vmware Vcenter Server 6.7 update3 All All
Application Vmware Vcenter Server 6.7 update3a All All
Application Vmware Vcenter Server 6.7 update3b All All
Application Vmware Vcenter Server 6.7 update3f All All
Application Vmware Vcenter Server 6.7 update3g All All
Application Vmware Vcenter Server 6.7 update3j All All
Application Vmware Vcenter Server 6.7 update3l All All
Application Vmware Vcenter Server 6.7 update3m All All
Application Vmware Vcenter Server 6.7 update3n All All
Application Vmware Vcenter Server 7.0 - All All
Application Vmware Vcenter Server 7.0 a All All
Application Vmware Vcenter Server 7.0 b All All
Application Vmware Vcenter Server 7.0 c All All
Application Vmware Vcenter Server 7.0 d All All
Application Vmware Vcenter Server 7.0 update1 All All
Application Vmware Vcenter Server 7.0 update1a All All
Application Vmware Vcenter Server 7.0 update1c All All
Application Vmware Vcenter Server 7.0 update1d All All
Application Vmware Vcenter Server 7.0 update2 All All
Application Vmware Vcenter Server 7.0 update2a All All
Application Vmware Vcenter Server 7.0 update2b All All

References

ReferenceSourceLinkTags
VMSA-2021-0020 MISC www.vmware.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 216265 VMware vCenter Server 7.0 Update 7.0 U2c (VMSA-2021-0020)
  • 216266 VMware vCenter Server 6.7 Update 6.7 U3o (VMSA-2021-0020)
  • 216267 VMware vCenter Server 6.5 Update 6.5 U3q (VMSA-2021-0020)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report