

VMWare mentioned that these issues needed immediate attention in their blog so we decided to review Shodan for a quick analysis on the number of vCenter Server instances directly connected to the Internet that are vulnerable to these flaws based on their self-reported version. This data was pulled from Shodan on May 31st, just six days after the public disclosure and patch were released. vCenter Server is used by many companies to manage their infrastructure making it a possible attack initiation point. VCenter Server is a centralized management utility to manage virtual machines, ESXi hosts, and other dependent components.

Any attackers with access to the network may exploit this vulnerability and execute commands with unrestricted privileges.
#Vmware esxi 6.7 end of life code
One of them was a remote code execution (RCE) in the vSphere Client (CVE-2021-21985) that exists due to a lack of input validation in the Virtual SAN Health Check plug-in, which is enabled by default in the vCenter Server. On May 25 th, 2021, VMWare released patches to address VMSA-2021-0010, a critical security advisory for VMWare vCenter Server addressing two vulnerabilities.
