Vulnerability Name: | CVE-2021-22015 (CCN-209739) | ||||||||||||
Assigned: | 2021-09-21 | ||||||||||||
Published: | 2021-09-21 | ||||||||||||
Updated: | 2023-02-03 | ||||||||||||
Summary: | VMware vCenter Server and Cloud Foundation could allow a local authenticated attacker to gian elevated privileges on the system, caused by improper permissions of files and directories. An attacker could exploit this vulnerability to elevate their privileges to root on vCenter Server Appliance. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-22015 Source: security@vmware.com Type: Exploit, Third Party Advisory, VDB Entry security@vmware.com Source: XF Type: UNKNOWN vmware-vcenter-cve202122015-priv-esc(209739) Source: CCN Type: VMware Security Advisory VMSA-2021-0020 VMware vCenter Server updates address multiple security vulnerabilities Source: security@vmware.com Type: Patch, Vendor Advisory security@vmware.com Source: CCN Type: ZDI-21-1106 VMware vCenter Server Appliance Service Lifecycle Manager Incorrect Permission Assignment Privilege Escalation Vulnerability Source: CCN Type: ZDI-21-1108 VMware vCenter Server Appliance Incorrect Permission Assignment Privilege Escalation Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |