| CVE ID | CVE-2021-22015 |
| CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
VMware |
| AFFECTED PRODUCTS |
vCenter Server Appliance |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of VMware vCenter Server Appliance. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Service Lifecycle Manager. The issue results from incorrect permissions set on a shell script. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. |
| ADDITIONAL DETAILS |
VMware has issued an update to correct this vulnerability. More details can be found at:
https://www.vmware.com/security/advisories/VMSA-2021-0020.html |
| DISCLOSURE TIMELINE |
|
| CREDIT | Sergey Gerasimov of Solidlab |