{"id":13568,"date":"2021-06-04T03:09:00","date_gmt":"2021-06-04T03:09:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=13568"},"modified":"2021-06-04T03:09:00","modified_gmt":"2021-06-04T03:09:00","slug":"vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/","title":{"rendered":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Vulnerability Description<\/h2>\n\n\n\n<p>On May 26, NSFOCUS CERT discovered that VMware released a security advisory that announces mitigation of the VMware vCenter Server remote code execution vulnerability (CVE-2021-21985) and vCenter Server plug-in authentication bypass vulnerability (CVE-2021-21986). The Virtual SAN Check plug-in in vCenter Server lacks input validation, allowing attackers who have accessed vSphere Client (HTML5) through port 443 to execute arbitrary code on the target host via a crafted packet. The affected plug-in is enabled by default in all vCenter Server deployments, whether or not vSAN is being used. The vulnerability has a CVSS score of 9.8. Affected users are advised to take mitigation measures against this vulnerability as soon as possible.<\/p>\n\n\n\n<p>vCenter Server is a server management solution from VMware to help IT administrators manage virtual machines and hosts in enterprise environments via a single console.<\/p>\n\n\n\n<p>Reference link: https:\/\/<a href=\"http:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0010.html\">www.vmware.com\/security\/advisories\/VMSA-2021-0010.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected Versions<\/strong><strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vmware vcenter_server &lt; 6.5 U3p<\/li><li>vmware vcenter_server &lt; 6.7 U3n<\/li><li>vmware vcenter_server &lt; 7.0 U2b<\/li><li>Cloud Foundation (vCenter Server) &lt; 3.10.2.1<\/li><li>Cloud Foundation (vCenter Server) &lt; 4.2.1<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official Fix<\/strong><\/p>\n\n\n\n<p>Currently, the vendor has fixed this vulnerability in the latest versions. Affected users are advised to upgrade as soon as possible from the following links:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product Version<\/strong><\/td><td><strong>Download Link<\/strong><\/td><td><strong>Operation Guide<\/strong><\/td><\/tr><tr><td>&nbsp; vCenter Server 7.0U2b<\/td><td><a href=\"https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/info\/sl ug\/datacenter_cloud_infrastr ucture\/vmware_vsphere\/7_0\">https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/info\/sl ug\/datacenter_cloud_infrastr ucture\/vmware_vsphere\/7_0<\/a><\/td><td>\u00a0<a href=\"https:\/\/docs.vmware.com\/en\/VMware -vSphere\/7.0\/rn\/vsphere-vcenter-ser ver-70u2b-release-notes.html\">https:\/\/docs.vmware.com\/en\/VMware -vSphere\/7.0\/rn\/vsphere-vcenter-ser ver-70u2b-release-notes.html<\/a><\/td><\/tr><tr><td>&nbsp; vCenter Server 6.7U3n<\/td><td><a href=\"https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/info\/sl ug\/datacenter_cloud_infrastr ucture\/vmware_vsphere\/6_7\">https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/info\/sl ug\/datacenter_cloud_infrastr ucture\/vmware_vsphere\/6_7<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware -vSphere\/6.7\/rn\/vsphere-vcenter-ser ver-67u3n-release-notes.html\">https:\/\/docs.vmware.com\/en\/VMware -vSphere\/6.7\/rn\/vsphere-vcenter-ser ver-67u3n-release-notes.html<\/a><\/td><\/tr><tr><td>&nbsp; vCenter Server 6.5U3p<\/td><td><a href=\"https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/info\/sl ug\/datacenter_cloud_infrastr ucture\/vmware_vsphere\/6_5\">https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/info\/sl ug\/datacenter_cloud_infrastr ucture\/vmware_vsphere\/6_5<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware -vSphere\/6.5\/rn\/vsphere-vcenter-ser ver-65u3p-release-notes.html\">https:\/\/docs.vmware.com\/en\/VMware -vSphere\/6.5\/rn\/vsphere-vcenter-ser ver-65u3p-release-notes.html<\/a><\/td><\/tr><tr><td>&nbsp; VMware vCloud Foundation 4.2.1<\/td><td><a href=\"https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/detail s?downloadGroup=VCF421&amp; productId=1121&amp;rPId=67576\">https:\/\/my.vmware.com\/en\/w eb\/vmware\/downloads\/detail s?downloadGroup=VCF421&amp; productId=1121&amp;rPId=67576<\/a><\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware -Cloud-Foundation\/4.2.1\/rn\/VMware- Cloud-Foundation-421-Release-Note s.html\">https:\/\/docs.vmware.com\/en\/VMware -Cloud-Foundation\/4.2.1\/rn\/VMware- Cloud-Foundation-421-Release-Note s.html<\/a><\/td><\/tr><tr><td>VMware vCloud Foundation 3.10.2.1<\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-Foundation\/3.10.2\/rn\/V Mware-Cloud-Foundation-3102-Release-Notes.html#3.10.2.1\">https:\/\/docs.vmware.com\/en\/VMware-Cloud-Foundation\/3.10.2\/rn\/V Mware-Cloud-Foundation-3102-Release-Notes.html#3.10.2.1<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Workaround<\/strong><\/p>\n\n\n\n<p>If it is impossible to upgrade currently, users can take the following mitigation measures by referring to the official link:<\/p>\n\n\n\n<p><a href=\"https:\/\/kb.vmware.com\/s\/article\/83829\">https:\/\/kb.vmware.com\/s\/article\/83829<\/a><\/p>\n\n\n\n<p><strong>Statement<\/strong><\/p>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On May 26, NSFOCUS CERT discovered that VMware released a security advisory that announces mitigation of the VMware vCenter Server remote code execution vulnerability (CVE-2021-21985) and vCenter Server plug-in authentication bypass vulnerability (CVE-2021-21986). The Virtual SAN Check plug-in in vCenter Server lacks input validation, allowing attackers who have accessed vSphere Client (HTML5) through [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[720],"class_list":["post-13568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-vmware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On May 26, NSFOCUS CERT discovered that VMware released a security advisory that announces mitigation of the VMware vCenter\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T03:09:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On May 26, NSFOCUS CERT discovered that VMware released a security advisory that announces mitigation of the VMware vCenter\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert\",\"datePublished\":\"2021-06-04T03:09:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/\"},\"wordCount\":500,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"keywords\":[\"VMware\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/\",\"name\":\"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"datePublished\":\"2021-06-04T03:09:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"width\":547,\"height\":400,\"caption\":\"VMware logo with geometric cloud design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS","og_description":"Vulnerability Description On May 26, NSFOCUS CERT discovered that VMware released a security advisory that announces mitigation of the VMware vCenter","og_url":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2021-06-04T03:09:00+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description On May 26, NSFOCUS CERT discovered that VMware released a security advisory that announces mitigation of the VMware vCenter","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert","datePublished":"2021-06-04T03:09:00+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/"},"wordCount":500,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","keywords":["VMware"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/","name":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","datePublished":"2021-06-04T03:09:00+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","width":547,"height":400,"caption":"VMware logo with geometric cloud design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21985-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"VMware VCenter Server Remote Code Execution Vulnerability (CVE-2021-21985) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/13568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=13568"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/13568\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10123"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=13568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=13568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=13568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}