Multiple vulnerabilities in the vSphere Client (HTML5) were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
The following systems/applications are affected:
VMware have release a security updates to address vulnerabilities in VMware vCenter Server and VMware ESX. For more details, please refer to:
Matsco Solutions are currently testing the fix to ensure there are no issues with it and will be reach out to clients running the affected VMware products to schedule updates to their environments.
Please contact the Matsco Solutions team on the below if you would like any further information or would like to schedule a maintenance.
Beijing +86 400 120 2782
Hong Kong +852 8101 8418
London +44 (0)20 7821 4950
New York +1 866 446 9226
Singapore +65 6100 1090
Share this Post