CVE-2021-21990
CVSS V2 Medium 4.3
CVSS V3 Medium 6.1
Description
VMware Workspace one UEM console (2102 prior to 21.2.0.8, 2101 prior to 21.1.0.14, 2011 prior to 20.11.0.27, 2010 prior to 20.10.0.16,2008 prior to 20.8.0.28, 2007 prior to 20.7.0.14,2006 prior to 20.6.0.19, 2005 prior to 20.5.0.46, 2004 prior to 20.4.0.21, 2003 prior to 20.3.0.23, 2001 prior to 20.1.0.32, 1912 prior to 19.12.0.24) contain a cross-site scripting vulnerability. VMware Workspace ONE UEM console does not validate incoming requests during device enrollment after leading to rendering of unsanitized input on the user device in response.
Overview
- CVE ID
- CVE-2021-21990
- Assigner
- security@vmware.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-05-11T14:15:07
- Last Modified Date
- 2022-06-05T02:10:17
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 19.0.0.0 | 19.12.0.24 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.1.0.0 | 20.1.0.32 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.3.0.0 | 20.3.0.23 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.4.0.0 | 20.4.0.21 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.5.0.0 | 20.5.0.46 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.6.0.0 | 20.6.0.19 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.7.0.0 | 20.7.0.14 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.8.0.0 | 20.8.0.28 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.10.0.0 | 20.10.0.16 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 20.11.0.0 | 20.11.0.27 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 21.1.0.0 | 21.1.0.14 |
cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:* | 1 | OR | 21.2.0.0 | 21.2.0.8 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- CHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 6.1
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 2.7
References
Reference URL | Reference Tags |
---|---|
https://www.vmware.com/security/advisories/VMSA-2021-0008.html | Vendor Advisory |
https://herolab.usd.de/security-advisories/usd-2021-0008/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-21990 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21990 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:11:01 | Added to TrackCVE | |||
2022-12-05 02:00:01 | 2021-05-11T14:15Z | 2021-05-11T14:15:07 | CVE Published Date | updated |
2022-12-05 02:00:01 | 2022-06-05T02:10:17 | CVE Modified Date | updated | |
2022-12-05 02:00:01 | Analyzed | Vulnerability Status | updated |