VMware has recently released security patches to address a serious command injection vulnerability, tracked as CVE-2021-21976, in its vSphere Replication product.
VMware vSphere Replication is an extension to VMware vCenter Server that provides hypervisor-based virtual machine replication and recovery. vSphere Replication is an alternative to storage-based replication.
The vulnerability can be exploited by an attacker with admin privileges to execute shell commands on the underlying system.
“vSphere Replication contains a post-authentication command injection vulnerability in “Startup Configuration” page.” reads the advisory published by the virtualization giant. “A malicious actor with administrative access in vSphere Replication can execute shell commands on the underlying system. Successful exploitation of this issue may allow authenticated admin user to perform a remote code execution.”
The CVE-2021-21976 flaw has been rated as ‘Important’ and received a CVSSv3 base score of 7.2.
The vulnerability was discovered by the researcher Egor Dimitrenko from Positive Technologies.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, CVE-2021-21976)
[adrotate banner=”5″]
[adrotate banner=”13″]
AISURU/Kimwolf botnet hit a record 31.4 Tbps DDoS attack lasting 35 seconds in Nov 2025,…
A study found nearly 5 million servers exposing Git metadata, with 250,000 leaking deployment credentials…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SmarterTools SmarterMail and React Native Community CLI…
Substack confirmed a data breach after a hacker leaked data from nearly 700,000 users, including…
Italy stopped Russian-linked cyberattacks targeting Foreign Ministry offices and Winter Olympics websites and hotels, Foreign…
China-linked hackers tracked as Amaranth-Dragon targeted government and law enforcement agencies across Southeast Asia in…
This website uses cookies.