VMware patches another severe security bug
VMware urges IT admins to treat this as an emergency and patch without delay
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
VMwarehas patched a remote code exploitation vulnerability that once again plagued its popular vCenter Server.
The issue this time around existed in a plugin in the vSphere HTML5 client. Whether you used the impacted Virtual SAN Health plugin or not, the fact that it lacks input validation, enabled malicious users to exploit it to execute commands with unrestricted privileges on the underlyingoperating systemthat hosts vCenter Server.
vCenter Server helps administer VMware’s vSphere and ESXi host products and is popularly used for managing thevirtualizationinstances indata centers.
We’re looking at how our readers use VPN for a forthcoming in-depth report. We’d love to hear your thoughts in the survey below. It won’t take more than 60 seconds of your time.
Click here to start the survey in a new window«
Given vCenter’s popularity and the scope of the vulnerability, it isn’t surprising that the vulnerability has been assigned a maximum severity score of 9.8.
Patch immediately
According to VMware’s security advisory, the vulnerability, tracked as CVE-2021-21985, impacts vCenter Server v6.5, v6.7, and v7.0.
VMware’’s technical marketing architect, Bob Plankerswroteabout the vulnerability and urged all users to apply the patches without delay.
“This vulnerability can be used by anyone who can reach vCenter Server over the network to gain access, regardless of whether you use vSAN or not,” wrote Plankers asking IT admins to treat the patch as an emergency change, while he shared some tips to apply the patch.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
VMware’s apparent urgency isn’t without cause. This is the second vCenter vulnerability this year with a severity rating of 9.8.
Ars Technicareports that malicious users were out scanning the Internet for vulnerable servers soon after the disclosure of the previous vulnerability and it took less than a day for them to write half a dozen proof-of-concept exploits.
ViaArs Technica
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.
This new phishing strategy utilizes GitHub comments to distribute malware
Should your VPN always be on?
NYT Strands today — hints, answers and spangram for Sunday, November 10 (game #252)