QID 216254

Date Published: 2022-02-09

QID 216254: VMware vCenter Server 6.7 Update 6.7 U3l Missing (VMSA-2021-0002)

VMware vCenter is the centralized management tool for the vSphere suite.

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8..

The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.

Affected Versions:
VMware vCenter Server 6.7 prior to build 17138064

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable versions of VMware vCenter Server with build version using web service present on target.

A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vmware has released patch for VMware vCenter Server 6.7 , visit VMware vCenter Server 6.7 Update 3l Release Notes

    Refer to VMware advisory VMSA-2021-0002 for more information.

    Workaround:
    Please refer to the article on details to apply the workaround VMware vCenter Server (82374)

    CVEs related to QID 216254

    Software Advisories
    Advisory ID Software Component Link
    VMSA-2021-0002 URL Logo www.vmware.com/security/advisories/VMSA-2021-0002.html