Post-authentication Command Injection Vulnerability in VMware vSphere Replication
CVE-2021-21976

7.2HIGH

Key Information:

Vendor
Vmware
Vendor
CVE Published:
11 February 2021

Summary

VMware vSphere Replication versions 8.3.x, 8.2.x, 8.1.x, and 6.5.x prior to their respective updates are vulnerable to a post-authentication command injection. This vulnerability allows an authenticated administrator to execute arbitrary commands on the affected systems, potentially leading to unauthorized access and control over critical infrastructure. Organizations using these versions should apply patches immediately to mitigate the risk of exploitation.

Affected Version(s)

vSphere Replication vSphere Replication 8.3.x prior to 8.3.1.2, 8.2.x prior to 8.2.1.1, 8.1.x prior to 8.1.2.3 and 6.5.x prior to 6.5.1.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.