VMware has rolled out patches to address a critical security vulnerability in vCenter Server that could be leveraged by an adversary to execute arbitrary code on the server. Tracked as CVE-2021-21985 (CVSS score 9.8), the issue stems from a lack of input validation in the Virtual SAN (vSAN) Health Check plug-in, which is enabled by default in the vCenter Server. "A malicious actor with network
https://thehackernews.com/2021/05/critical-rce-vulnerability-found-in.html?utm_source=dlvr.it&utm_medium=blogger
No comments:
Post a Comment