QID 730102

Date Published: 2021-06-03

QID 730102: VMware vCenter Server Remote Code Execution (RCE) Vulnerability (VMSA-2021-0010) (UNAUTHENTICATED))

VMware vCenter is the centralized management tool for the vSphere suite.

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. (CVE-2021-21985)

Affected Versions:
VMware vCenter Server 7.0 prior to build 17958471
VMware vCenter Server 6.7 prior to build 18010531
VMware vCenter Server 6.5 prior to build 17994927

QID Detection Logic (Unauthenticated):
The QID sends a POST request to " /ui/h5-vsan/rest/proxy/service/com.vmware.vsan.client.services.capability.VsanCapabilityProvider/getHostCapabilityData" to detect if the target is vulnerable or not.
Note: If the workaround mentioned by the vendor is applied, QID will not flag.

Successful exploitation of the vulnerability will allow remote code execution.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    VMware has released patch for VMware vCenter Server 7.0/6.7/6.5 ,

    Refer to VMware advisory VMSA-2021-0010 for more information.

    Workaround:
    Affected Plugins must be set to "incompatible." Disabling a plugin from within the UI does not prevent exploitation. Please refer to KB article KB83829 for more information.

    CVEs related to QID 730102

    Software Advisories
    Advisory ID Software Component Link
    VMSA-2021-0010 URL Logo www.vmware.com/security/advisories/VMSA-2021-0010.html