CVE-2021-21980

The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:cloud_foundation:3.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3n:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3p:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3q:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3l:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3m:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3n:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3o:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo

30 Nov 2021, 01:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-200
CPE cpe:2.3:a:vmware:vcenter_server:6.7:update_3b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1e:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3j:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3m:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3p:*:*:*:*:*:*
cpe:2.3:a:vmware:cloud_foundation:3.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3l:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3n:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3n:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3f:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3k:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2g:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_1:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2d:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_3q:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3o:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_3:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_2a:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_1c:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_2:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.7:update_1b:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:6.5:update_2:*:*:*:*:*:*
References (MISC) https://www.vmware.com/security/advisories/VMSA-2021-0027.html - (MISC) https://www.vmware.com/security/advisories/VMSA-2021-0027.html - Patch, Vendor Advisory

24 Nov 2021, 17:57

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-24 17:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-21980

Mitre link : CVE-2021-21980

CVE.ORG link : CVE-2021-21980


JSON object : View

Products Affected

vmware

  • vcenter_server
  • cloud_foundation