The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 29 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 29 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-470 CWE-918 |
Status: PUBLISHED
Assigner: vmware
Published: 2021-05-26T14:04:30.000Z
Updated: 2025-10-21T23:25:44.978Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21985
Updated: 2024-08-03T18:30:23.663Z
Status : Modified
Published: 2021-05-26T15:15:07.937
Modified: 2025-10-22T00:17:22.610
Link: CVE-2021-21985
No data.