CVE-2021-21991
22.09.2021, 19:15
The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).Enginsight
Vendor | Product | Version |
---|---|---|
vmware | cloud_foundation | 3.0 ≤ 𝑥 < 3.10.2.2 |
vmware | cloud_foundation | 4.0 ≤ 𝑥 < 4.3 |
vmware | vcenter_server | 6.5 |
vmware | vcenter_server | 6.5:a |
vmware | vcenter_server | 6.5:b |
vmware | vcenter_server | 6.5:c |
vmware | vcenter_server | 6.5:d |
vmware | vcenter_server | 6.5:e |
vmware | vcenter_server | 6.5:f |
vmware | vcenter_server | 6.5:update1 |
vmware | vcenter_server | 6.5:update1b |
vmware | vcenter_server | 6.5:update1c |
vmware | vcenter_server | 6.5:update1d |
vmware | vcenter_server | 6.5:update1e |
vmware | vcenter_server | 6.5:update1g |
vmware | vcenter_server | 6.5:update2 |
vmware | vcenter_server | 6.5:update2b |
vmware | vcenter_server | 6.5:update2c |
vmware | vcenter_server | 6.5:update2d |
vmware | vcenter_server | 6.5:update2g |
vmware | vcenter_server | 6.5:update3 |
vmware | vcenter_server | 6.5:update3d |
vmware | vcenter_server | 6.5:update3f |
vmware | vcenter_server | 6.5:update3k |
vmware | vcenter_server | 6.5:update3n |
vmware | vcenter_server | 6.5:update3p |
vmware | vcenter_server | 6.7 |
vmware | vcenter_server | 6.7 |
vmware | vcenter_server | 6.7:a |
vmware | vcenter_server | 6.7:b |
vmware | vcenter_server | 6.7:d |
vmware | vcenter_server | 6.7:update1 |
vmware | vcenter_server | 6.7:update1b |
vmware | vcenter_server | 6.7:update2 |
vmware | vcenter_server | 6.7:update2a |
vmware | vcenter_server | 6.7:update2c |
vmware | vcenter_server | 6.7:update3 |
vmware | vcenter_server | 6.7:update3a |
vmware | vcenter_server | 6.7:update3b |
vmware | vcenter_server | 6.7:update3f |
vmware | vcenter_server | 6.7:update3g |
vmware | vcenter_server | 6.7:update3j |
vmware | vcenter_server | 6.7:update3l |
vmware | vcenter_server | 6.7:update3m |
vmware | vcenter_server | 6.7:update3n |
vmware | vcenter_server | 7.0 |
vmware | vcenter_server | 7.0:a |
vmware | vcenter_server | 7.0:b |
vmware | vcenter_server | 7.0:c |
vmware | vcenter_server | 7.0:d |
vmware | vcenter_server | 7.0:update1 |
vmware | vcenter_server | 7.0:update1a |
vmware | vcenter_server | 7.0:update1c |
vmware | vcenter_server | 7.0:update1d |
vmware | vcenter_server | 7.0:update2 |
vmware | vcenter_server | 7.0:update2a |
vmware | vcenter_server | 7.0:update2b |
𝑥
= Vulnerable software versions