CVE-2021-21974

Sep 3, 2024

Published Date: 2021-02-24T17:15Z
Last Modified: 2022-06-02T14:41Z

CVSS Score: 8.8 (HIGH)

EPSS Score: 93.14%

Risk Score: 6.44 (HIGH)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 8.8  |  EPSS: 93.14%

Description: OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.

Mitre ATT&CK Technical v15.1

None

Technical Analysis & Mitigation Measures

Reference Links

Vendor - Produce - Version

cloud_foundation - vmware, cloud_foundation - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware, esxi - vmware

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.