VMware patches critical ESXi and vSphere Client vulnerabilities
These include a 9.8-rated bug that hackers can exploit to execute remote commands with unrestricted privileges


VMware has fixed three critically-rated flaws across its virtualisation products that could be exploited by hackers to conduct remote code execution attacks against enterprise systems.
The firm has issued updates for three flaws present across its VMware ESXi bare-metal hypervisor and vSphere Client virtual infrastructure management platform, including a severe bug rated 9.8 out of ten on the CVSS scale.
This vulnerability, tracked as CVE-2021-21972, is embedded in a vCenter Server plugin in the vSphere Client. Attackers with network access to port 443 may exploit this to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Also patched is CVE-2021-21974, which is a heap buffer overflow vulnerability in the OpenSLP component of ESXi and is also rated a severe 8.8. Cyber criminals lying dormant within the same network segment as ESXi, also with access to port 427, may trigger the issue in OpenSLP which could also result in remote code execution.
Finally, CVE-2021-21973 is a server-side request forgery (SSRF) flaw in vSphere Client which has arisen due to improper validation of URLs in a vCenter Server plugin. This is not as severe as the other two bugs, having only been rated 5.3, but can also be exploited by those with access to port 443 to leak information.
There are workarounds that users can deploy for both CVE-2021-21972 and CVE-2021-21973 that are detailed here until a fix is deployed by the system administrator.
Users can patch these flaws, however, by updating the products to the most recent versions. These include 7.0 U1c, 6.7U3I and 6.5 U3n of vCenter Server, 4.2 and 3.10.1.2 of Cloud Foundation, as well as ESXi70U1c-17325551, ESXi670-202102401-SG and ESXi650-202102101-SG of ESXi.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
These vulnerabilities were privately brought to the attention of VMware and customers are urged to patch their systems immediately.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Barracuda Networks says hacked devices “must be immediately replaced” despite patches
News Seven-month exploitation of a critical vulnerability enabled persistent backdoor access in its email security gateway devices
By Ross Kelly Published
-
The IT Pro Podcast: The problem with APIs
IT Pro Podcast With API attacks on the rise, knowing your attack surface is crucial
By IT Pro Published
-
Podcast transcript: The problem with APIs
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
-
GTA V vulnerability exposes PC users to partial remote code execution attacks
News Millions of GTA Online players could fall prey to malware or data corruption
By Rory Bathgate Published
-
MSI to release securer BIOS settings after critical flaw discovered
News The firm has admitted it essentially disabled Secure Boot on its motherboards in an attempt to improve customisability
By Rory Bathgate Published
-
China-backed hackers take down Amnesty International Canada for three weeks
News Cyber security experts linked state-sponsored APTs to the tools and methodology of the attack, which may have been intended as a covert campaign
By Rory Bathgate Published
-
Hyundai vulnerability allowed remote hacking of locks, engine
News Researchers discovered flaws in a number of apps linked to car brands that allowed for personal details and remote control of vehicles using easily-obtained IDs
By Rory Bathgate Published
-
Lenovo patches ThinkPad, Yoga, IdeaPad UEFI secure boot vulnerability
News Mistakenly used drivers could allow hackers to modify the secure boot process
By Rory Bathgate Published