QID 216255

Date Published: 2022-02-09

QID 216255: VMware vCenter Server 6.5 Update 6.5 U3n Missing (VMSA-2021-0002)

VMware vCenter is the centralized management tool for the vSphere suite.

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8..

The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.

Affected Versions:
VMware vCenter Server 6.5 prior to build 17590285

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable versions of VMware vCenter Server with build version using web service present on target.

A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vmware has released patch for VMware vCenter Server 6.5 , visit VMware vCenter Server 6.5 Update 3n Release Notes

    Refer to VMware advisory VMSA-2021-0002 for more information.

    Workaround:
    Please refer to the article on details to apply the workaround VMware vCenter Server (82374)

    CVEs related to QID 216255

    Software Advisories
    Advisory ID Software Component Link
    VMSA-2021-0002 URL Logo www.vmware.com/security/advisories/VMSA-2021-0002.html