VMware has recently released security patches to address a serious command injection vulnerability, tracked as CVE-2021-21976, in its vSphere Replication product.
VMware vSphere Replication is an extension to VMware vCenter Server that provides hypervisor-based virtual machine replication and recovery. vSphere Replication is an alternative to storage-based replication.
The vulnerability can be exploited by an attacker with admin privileges to execute shell commands on the underlying system.
“vSphere Replication contains a post-authentication command injection vulnerability in “Startup Configuration” page.” reads the advisory published by the virtualization giant. “A malicious actor with administrative access in vSphere Replication can execute shell commands on the underlying system. Successful exploitation of this issue may allow authenticated admin user to perform a remote code execution.”
The CVE-2021-21976 flaw has been rated as ‘Important’ and received a CVSSv3 base score of 7.2.
The vulnerability was discovered by the researcher Egor Dimitrenko from Positive Technologies.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, CVE-2021-21976)
[adrotate banner=”5″]
[adrotate banner=”13″]
Romania’s national oil pipeline operator Conpet said a cyberattack disrupted its business systems and temporarily…
Flickr says a flaw at a third-party email provider may have exposed users’ names, email…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware…
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…
DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware…
Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused…
This website uses cookies.