VMware has recently released security patches to address a serious command injection vulnerability, tracked as CVE-2021-21976, in its vSphere Replication product.
VMware vSphere Replication is an extension to VMware vCenter Server that provides hypervisor-based virtual machine replication and recovery. vSphere Replication is an alternative to storage-based replication.
The vulnerability can be exploited by an attacker with admin privileges to execute shell commands on the underlying system.
“vSphere Replication contains a post-authentication command injection vulnerability in “Startup Configuration” page.” reads the advisory published by the virtualization giant. “A malicious actor with administrative access in vSphere Replication can execute shell commands on the underlying system. Successful exploitation of this issue may allow authenticated admin user to perform a remote code execution.”
The CVE-2021-21976 flaw has been rated as ‘Important’ and received a CVSSv3 base score of 7.2.
The vulnerability was discovered by the researcher Egor Dimitrenko from Positive Technologies.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, CVE-2021-21976)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.