{"id":12634,"date":"2021-03-01T03:16:13","date_gmt":"2021-03-01T03:16:13","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12634"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"vmware-multiple-high-risk-vulnerabilities","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/vmware-multiple-high-risk-vulnerabilities\/","title":{"rendered":"VMware Multiple High-Risk Vulnerabilities"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Vulnerability Description<\/h2>\n\n\n\n<p>On February 23, 2021, VMware released a security bulletin to announce the fix of two high-risk vulnerabilities in vSphere Client and ESXi.<\/p>\n\n\n\n<p>CVE-2021-21972: vSphere Client (HTML5) contains a remote code execution vulnerability in the vRealize Operations plug-in in vCenter Server, with the CVSSv3 score of 9.8. The affected vRealize Operations plug-in is installed in vCenter Server by default.<\/p>\n\n\n\n<p>CVE-2021-21974: OpenSLP used in ESXi is prone to a heap overflow vulnerability with a CVSSv3 score of 8.8. An attacker that is in the same network segment as ESXi and has access to port 427 could cause arbitrary code execution by triggering a heap-based overflow in the OpenSLP service.<\/p>\n\n\n\n<p>Reference link: https:\/\/<a href=\"http:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0002.html\">www.vmware.com\/security\/advisories\/VMSA-2021-0002.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">C<strong>VE-2021-21972<\/strong><\/h3>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vCenter Server 7.0 &lt; 7.0 U1c<\/li><li>vCenter Server 6.7 &lt; 6.7 U3l<\/li><li>vCenter Server 6.5 &lt; 6.5 U3n<\/li><li>Cloud Foundation (vCenter Server) 4.X &lt; 4.2<\/li><li>Cloud Foundation (vCenter Server) 3.X &lt; 3.10.1.2<\/li><\/ul>\n\n\n\n<p><strong>Unaffected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vCenter Server 7.0 U1c<\/li><li>vCenter Server 6.7 U3l<\/li><li>vCenter Server 6.5 U3n<\/li><li>Cloud Foundation (vCenter Server) 4.2<\/li><li>Cloud Foundation (vCenter Server) 3.10.1.2<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">C<strong>VE-2021-21974<\/strong><\/h3>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>ESXi 7.0 &lt; 70U1c-17325551<\/li><li>ESXi 6.7 &lt; 670-202102401-SG<\/li><li>ESXi 6.5 &lt; 650-202102101-SG<\/li><li>Cloud Foundation (ESXi) 4.X &lt;4.2<\/li><li>Cloud Foundation (ESXi) 3.X<\/li><\/ul>\n\n\n\n<p><strong>Unaffected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>ESXi 70U1c-17325551<\/li><li>ESXi 670-202102401-SG<\/li><li>ESXi 650-202102101-SG<\/li><li>Cloud Foundation (ESXi) 4.2<\/li><li>Cloud Foundation (ESXi) 3.X hotfix KB82705<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Official Fix<\/h3>\n\n\n\n<p>Currently, the vendor has fixed this vulnerability in the latest versions. Affected users are advised to upgrade as soon as possible from the following links:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Product Version<\/th><th>Download Link<\/th><th>Operation Document<\/th><\/tr><\/thead><tbody><tr><td>VMware ESXi 7.0 ESXi7<br>0U1c-17325551<\/td><td><a href=\"https:\/\/my.vmware.com\/group\/v%20mware\/patch\">https:\/\/my.vmware.com\/group\/v mware\/patch<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/7.0\/rn\/vsphere-esxi-70u1c.html\">https:\/\/docs.vmware.com\/en\/VMware-vSphere\/7.0\/rn\/vsphere-esxi-70u1c.html<\/a><\/td><\/tr><tr><td>VMware ESXi 6.7 ESXi670-202102401-SG<\/td><td><a href=\"https:\/\/my.vmware.com\/group\/v%20mware\/patch\">https:\/\/my.vmware.com\/group\/v mware\/patch<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.7\/rn\/esxi670-202102001.html\">https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.7\/rn\/esxi670-202102001.html<\/a><\/td><\/tr><tr><td>VMware ESXi 6.5 ESXi650-202102101-SG<\/td><td><a href=\"https:\/\/my.vmware.com\/group\/v%20mware\/patch\">https:\/\/my.vmware.com\/group\/v mware\/patch<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.5\/rn\/esxi650-202102001.html\">https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.5\/rn\/esxi650-202102001.html<\/a><\/td><\/tr><tr><td>VMware vCloud Foundation 4.2<\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-Foundation\/4.2\/rn\/VMware-Cloud-Foundation-42-Release-Notes.html\">https:\/\/docs.vmware.com\/en\/VMware-Cloud-Foundation\/4.2\/rn\/VMware-Cloud-Foundation-42-Release-Notes.html<\/a><\/td><td><\/td><\/tr><tr><td>VMware vCloud Foundation 3.10.1.2<\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-Foundation\/3.10.1\/rn\/VMware-Cloud-Foundation-3101-Release-Notes.html\">https:\/\/docs.vmware.com\/en\/VMware-Cloud-Foundation\/3.10.1\/rn\/VMware-Cloud-Foundation-3101-Release-Notes.html<\/a><\/td><td><\/td><\/tr><tr><td>vCenter Server 7.0.1 Update 1<\/td><td><a href=\"https:\/\/my.vmware.com\/web\/vm%20ware\/downloads\/details?downlo%20adGroup=VC70U1C&amp;productId=974\">https:\/\/my.vmware.com\/web\/vm ware\/downloads\/details?downlo adGroup=VC70U1C&amp;productId=974<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSpher%20e\/7.0\/rn\/vsphere-vcenter-server-70u1c-release-notes.html\">https:\/\/docs.vmware.com\/en\/VMware-vSpher e\/7.0\/rn\/vsphere-vcenter-server-70u1c-release-notes.html<\/a><\/td><\/tr><tr><td>vCenter Server 6.7 U3l<\/td><td><a href=\"https:\/\/my.vmware.com\/web\/vm%20ware\/downloads\/details?downlo%20adGroup=VC67U3L&amp;productId=742&amp;rPId=57171\">https:\/\/my.vmware.com\/web\/vm ware\/downloads\/details?downlo adGroup=VC67U3L&amp;productId=742&amp;rPId=57171<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSpher%20e\/6.7\/rn\/vsphere-vcenter-server-67u3l-release%0A-notes.html\">https:\/\/docs.vmware.com\/en\/VMware-vSpher e\/6.7\/rn\/vsphere-vcenter-server-67u3l-release-notes.html<\/a><\/td><\/tr><tr><td>vCenter Server 6.5 U3n<\/td><td><a href=\"https:\/\/my.vmware.com\/web\/vm%20ware\/downloads\/details?downlo%20adGroup=VC65U3N&amp;productId=614&amp;rPId=60942\">https:\/\/my.vmware.com\/web\/vm ware\/downloads\/details?downlo adGroup=VC65U3N&amp;productId=614&amp;rPId=60942<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSpher%20e\/6.5\/rn\/vsphere-vcenter-server-65u3n-releas%20e-notes.html\">https:\/\/docs.vmware.com\/en\/VMware-vSpher e\/6.5\/rn\/vsphere-vcenter-server-65u3n-releas e-notes.html<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">2. Workaround<\/h3>\n\n\n\n<p><strong>1. CVE-2021-21972<\/strong><\/p>\n\n\n\n<p>You can disable the vROPS plug-in by referring to the official recommendations (https:\/\/kb.vmware.com\/s\/article\/82374) given below:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>1) Remotely connect to VCSA (or connect to Windows VC via the remote desktop) through SSH.<\/p>\n\n\n\n<p>2) Back up the following file:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\/etc\/vmware\/vsphere-ui\/compatibility-matrix.xml (vCSA)<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vsphere-ui (Windows VC)<\/li><\/ul>\n\n\n\n<p>3) Add one line using a text editor<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>&lt;Matrix&gt;<\/p>\n\n\n\n<p class=\"has-drop-cap\">       &lt;pluginsCompatibility&gt;<\/p>\n\n\n\n<p class=\"has-drop-cap\">                . . . .<\/p>\n\n\n\n<p class=\"has-text-color has-drop-cap has-vivid-red-color\">                &lt;PluginPackage id=&#8221;com.vmware.vrops.install&#8221; status=&#8221;incompatible&#8221;\/&gt;<\/p>\n\n\n\n<p class=\"has-drop-cap\">                 . . . .<\/p>\n\n\n\n<p>              &lt;\/pluginsCompatibility&gt;<\/p>\n\n\n\n<p>&lt;\/Matrix&gt;<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p>The final file content is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"903\" height=\"417\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03011.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12639\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03011.jpg 903w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03011-300x139.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03011-768x355.jpg 768w\" sizes=\"(max-width: 903px) 100vw, 903px\" \/><\/figure>\n\n\n\n<p>4) Restart the vsphere-ui service using the command: vmon-cli -r vsphere-ui.<\/p>\n\n\n\n<p>5) Check whether the vROPS plug-in is disabled: If the vROPS plug-in is disabled, a response page with the 404 status code is returned when you access the URL:<\/p>\n\n\n\n<p>https:\/\/&lt;VC-IP-or-FQDN&gt;\/ui\/vropspluginui\/rest\/services\/checkmobregister<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03012-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12642\"><\/figure>\n\n\n\n<p>Under <strong>VSphere Client &gt; Solutions &gt; Client Plugins<\/strong>, <strong>VMware vRops Client Plugin<\/strong> should be displayed as <strong>incompatible<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"886\" height=\"268\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03013.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12643\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03013.jpg 886w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03013-300x91.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/03013-768x232.jpg 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure>\n\n\n\n<p><strong>2. CVE-2021-21974<\/strong><\/p>\n\n\n\n<p>You can disable the CIM server by referring to the official recommendations (<a href=\"https:\/\/kb.vmware.com\/s\/article\/76372\">https:\/\/kb.vmware.com\/s\/article\/76372<\/a>) given below:<\/p>\n\n\n\n<p>1) Stop the SLP service on the ESXi host using the following command: <span style=\"color:#818a92\" class=\"has-inline-color\">\/etc\/init.d\/slpd stop<\/span>. This service can be stopped only when it is not in use. You can run the &#8220;<span style=\"color:#818a92\" class=\"has-inline-color\">esxcli system slp stats get<\/span>&#8221; command to view the operating status of the service daemon.<\/p>\n\n\n\n<p>2) Run the following command to disable the SLP service: <span style=\"color:#818a92\" class=\"has-inline-color\">esxcli network firewall ruleset set -r CIMSLP -e 0<\/span><\/p>\n\n\n\n<p><img decoding=\"async\" src=\"\" style=\"width: undefinedpx\">3) Run the following command to make the preceding change persist across the reboots: <span style=\"color:#818a92\" class=\"has-inline-color\">chkconfig slpd off<\/span><\/p>\n\n\n\n<p>4) Run the following command to check whether the change is applied upon a reboot: <span style=\"color:#818a92\" class=\"has-inline-color\">chkconfig &#8211;list | grep slpd<\/span> If yes, the command output should be <span style=\"color:#818a92\" class=\"has-inline-color\">slpd off<\/span>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Statement<\/strong><\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About NSFOCUS<\/strong><\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyberattacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA). A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On February 23, 2021, VMware released a security bulletin to announce the fix of two high-risk vulnerabilities in vSphere Client and ESXi. CVE-2021-21972: vSphere Client (HTML5) contains a remote code execution vulnerability in the vRealize Operations plug-in in vCenter Server, with the CVSSv3 score of 9.8. The affected vRealize Operations plug-in is installed [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[720],"class_list":["post-12634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-vmware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VMware Multiple High-Risk Vulnerabilities - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware Multiple High-Risk Vulnerabilities - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On February 23, 2021, VMware released a security bulletin to announce the fix of two high-risk vulnerabilities in vSphere Client\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-01T03:16:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"VMware Multiple High-Risk Vulnerabilities - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On February 23, 2021, VMware released a security bulletin to announce the fix of two high-risk vulnerabilities in vSphere Client\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"VMware Multiple High-Risk Vulnerabilities\",\"datePublished\":\"2021-03-01T03:16:13+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/\"},\"wordCount\":963,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"keywords\":[\"VMware\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/\",\"name\":\"VMware Multiple High-Risk Vulnerabilities - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"datePublished\":\"2021-03-01T03:16:13+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"width\":547,\"height\":400,\"caption\":\"VMware logo with geometric cloud design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-multiple-high-risk-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VMware Multiple High-Risk Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware Multiple High-Risk Vulnerabilities - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/","og_locale":"pt_BR","og_type":"article","og_title":"VMware Multiple High-Risk Vulnerabilities - NSFOCUS","og_description":"Vulnerability Description On February 23, 2021, VMware released a security bulletin to announce the fix of two high-risk vulnerabilities in vSphere Client","og_url":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/","og_site_name":"NSFOCUS","article_published_time":"2021-03-01T03:16:13+00:00","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"VMware Multiple High-Risk Vulnerabilities - NSFOCUS","twitter_description":"Vulnerability Description On February 23, 2021, VMware released a security bulletin to announce the fix of two high-risk vulnerabilities in vSphere Client","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"VMware Multiple High-Risk Vulnerabilities","datePublished":"2021-03-01T03:16:13+00:00","dateModified":"2026-04-17T18:07:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/"},"wordCount":963,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","keywords":["VMware"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/","url":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/","name":"VMware Multiple High-Risk Vulnerabilities - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","datePublished":"2021-03-01T03:16:13+00:00","dateModified":"2026-04-17T18:07:46+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","width":547,"height":400,"caption":"VMware logo with geometric cloud design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/vmware-multiple-high-risk-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"VMware Multiple High-Risk Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12634"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12634\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10123"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}