QID 216267

Date Published: 2021-09-22

QID 216267: VMware vCenter Server 6.5 Update 6.5 U3q (VMSA-2021-0020)

VMware vCenter Server is a server management solution that helps IT admins manage virtualized hosts and virtual machines in enterprise environments via a single console.

The vCenter Server contains multiple vulnerabilities. VMware has evaluated the severity of these issue to be in the Important severity range with a maximum CVSSv3 base score of 8.8.

Affected Versions: vCenter Server 6.5
QID Detection Logic (Unauthenticated):

This update addresses multiple vulnerabilities as stated below:
vCenter Server unauthenticated API information disclosure vulnerability (CVE-2021-22012)
vCenter Server file path traversal vulnerability (CVE-2021-22013)
vCenter Server rhttpproxy bypass vulnerability (CVE-2021-22017)
vCenter Server local privilege escalation vulnerability (CVE-2021-21991)
vCenter Server SSRF vulnerability (CVE-2021-21993)
vCenter Server XML parsing denial-of-service vulnerability (CVE-2021-21992)
vCenter Server information disclosure vulnerability (CVE-2021-22008)
vCenter Server VAPI multiple denial of service vulnerabilities (CVE-2021-22009)
vCenter server unauthenticated API endpoint vulnerability (CVE-2021-22011)
vCenter Server authenticated code execution vulnerability (CVE-2021-22014)
vCenter Server improper permission local privilege escalation vulnerabilities (CVE-2021-22015)
vCenter Server denial of service vulnerability (CVE-2021-22019)

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Vmware has released patch for VMware vCenter Server 6.5 , visit VMware vCenter Server 6.5 Update 3q Release Notes

    Refer to VMware advisory VMSA-2021-0020 for more information.

    Software Advisories
    Advisory ID Software Component Link
    VMSA-2021-0020 URL Logo www.vmware.com/security/advisories/VMSA-2021-0020.html