CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

vmware

vcenter_server

41 known vulnerabilities · sorted by CVSS score

CVE-2021-21972
CRITICAL9.8

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).

vmware / cloud_foundation+42
Network
Published Feb 24, 2021
Page 1 of 3
CVE-2021-22049
CRITICAL9.8

The vSphere Web Client (FLEX/Flash) contains an SSRF (Server Side Request Forgery) vulnerability in the vSAN Web Client (vSAN UI) plug-in. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.

vmware / vcenter_server+2
Network
Published Nov 24, 2021
CVE-2021-21986
CRITICAL9.8

The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins. A malicious actor with network access to port 443 on vCenter Server may perform actions allowed by the impacted plug-ins without authentication.

vmware / vcenter_server+52
Network
Published May 26, 2021
CVE-2021-21985
CRITICAL9.8

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

vmware / vcenter_server+52
Network
Published May 26, 2021
CVE-2023-34048
CRITICAL9.8

vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

vmware / vcenter_server+36
Network
Published Oct 25, 2023
CVE-2021-22005
CRITICAL9.8

The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.

vmware / cloud_foundation+3
Network
Published Sep 23, 2021
CVE-2022-31680
CRITICAL9.1

The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.

vmware / vcenter_server+27
Network
Published Oct 7, 2022
CVE-2021-22048
HIGH8.8

The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism. A malicious actor with non-administrative access to vCenter Server may exploit this issue to elevate privileges to a higher privileged group.

vmware / cloud_foundation+4
Network
Published Nov 10, 2021
CVE-2023-20895
HIGH8.1

The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.

vmware / vcenter_server+32
Network
Published Jun 22, 2023
CVE-2023-20892
HIGH8.1

The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server.

vmware / vcenter_server+32
Network
Published Jun 22, 2023
CVE-2023-20893
HIGH8.1

The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

vmware / vcenter_server+32
Network
Published Jun 22, 2023
CVE-2023-20894
HIGH8.1

The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.

vmware / vcenter_server+32
Network
Published Jun 22, 2023
CVE-2021-22015
HIGH7.8

The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.

vmware / cloud_foundation+3
Local
Published Sep 23, 2021
CVE-2021-21991
HIGH7.8

The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).

vmware / cloud_foundation+56
Local
Published Sep 22, 2021
CVE-2021-22013
HIGH7.5

The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

vmware / cloud_foundation+2
Network
Published Sep 23, 2021
CVE-2021-22012
HIGH7.5

The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

vmware / cloud_foundation+2
Network
Published Sep 23, 2021
CVE-2022-22982
HIGH7.5

The vCenter Server contains a server-side request forgery (SSRF) vulnerability. A malicious actor with network access to 443 on the vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.

vmware / cloud_foundation+68
Network
Published Jul 13, 2022
CVE-2021-22006
HIGH7.5

The vCenter Server contains a reverse proxy bypass vulnerability due to the way the endpoints handle the URI. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.

vmware / cloud_foundation+2
Network
Published Sep 23, 2021
CVE-2021-22009
HIGH7.5

The vCenter Server contains multiple denial-of-service vulnerabilities in VAPI (vCenter API) service. A malicious actor with network access to port 443 on vCenter Server may exploit these issues to create a denial of service condition due to excessive memory consumption by VAPI service.

vmware / cloud_foundation+2
Network
Published Sep 23, 2021
CVE-2021-21980
HIGH7.5

The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

vmware / cloud_foundation+35
Network
Published Nov 24, 2021