Unrated severityCISA KEVNVD Advisory· Published May 26, 2021· Updated Oct 21, 2025
CVE-2021-21985
CVE-2021-21985
Description
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Affected products
1- VMware/vSphere Clientdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.htmlmitrex_refsource_MISC
- www.vmware.com/security/advisories/VMSA-2021-0010.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.