Loading
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Use CWE-918, Vmware vendor hub and Vcenter Server product page to widen CVE-2021-21985 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-38812, CVE-2024-37079 and CVE-2023-34048 for nearby disclosures in the same product family.