2021-04-19 (Initial Advisory)
VMware NSX-T updates address a privilege escalation vulnerability (CVE-2021-21981)
1. Impacted Products
A privilege escalation vulnerability in VMware NSX-T was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware product.
3. Privilege escalation vulnerability (CVE-2021-21981)
VMware NSX-T contains a privilege escalation vulnerability due to an issue with RBAC (Role based access control) role assignment. VMware has evaluated this issue to be ‘Important’ severity with a maximum CVSSv3 base score of 7.5.
Known Attack Vectors
Successful exploitation of this issue may allow attackers with local guest user account to assign privileges higher than their own permission level.
To remediate CVE-2021-21981 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.
Workarounds for CVE-2021-21981 have been listed in the ‘Workarounds’ column of the ‘Response Matrix’ below.
 To exploit this issue, NSX Enterprise administrator must activate the local guest user account. It is not activated by default.  This issue affects only version 3.1.1. Other versions are not affected.
VMware NSX-T 3.1.2 Downloads and Documentation:https://my.vmware.com/en/web/vmware/downloads/details?downloadGroup=NSX-T-312&productId=982&rPId=64728https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html
Mitre CVE Dictionary Links:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21981
FIRST CVSSv3 Calculator: CVE-2021-21981: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
5. Change Log
2021-04-19 VMSA-2021-0006 Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Tweets by VMwareSRC
Copyright 2021 VMware Inc. All rights reserved. VMware Security AdvisoryRead More