CVE-2021-21990
Published May 11, 2021
Last updated 2 years ago
Overview
- Description
- VMware Workspace one UEM console (2102 prior to 21.2.0.8, 2101 prior to 21.1.0.14, 2011 prior to 20.11.0.27, 2010 prior to 20.10.0.16,2008 prior to 20.8.0.28, 2007 prior to 20.7.0.14,2006 prior to 20.6.0.19, 2005 prior to 20.5.0.46, 2004 prior to 20.4.0.21, 2003 prior to 20.3.0.23, 2001 prior to 20.1.0.32, 1912 prior to 19.12.0.24) contain a cross-site scripting vulnerability. VMware Workspace ONE UEM console does not validate incoming requests during device enrollment after leading to rendering of unsanitized input on the user device in response.
- Source
- security@vmware.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01E694DD-DB37-4B2D-843D-5D9DBF6A0991", "versionEndExcluding": "19.12.0.24", "versionStartIncluding": "19.0.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EE0A491-B5EA-428F-88B5-4683F21211CD", "versionEndExcluding": "20.1.0.32", "versionStartIncluding": "20.1.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AA68C00-CB7E-4CC2-86E5-C16E7D4F1641", "versionEndExcluding": "20.3.0.23", "versionStartIncluding": "20.3.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59FB3489-8964-47E7-BE0B-1B24698945BC", "versionEndExcluding": "20.4.0.21", "versionStartIncluding": "20.4.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E06C3D93-0BAD-4E25-8A76-1796D6B45BE7", "versionEndExcluding": "20.5.0.46", "versionStartIncluding": "20.5.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "015C32EB-214F-45FC-87A9-5EEC11A257E3", "versionEndExcluding": "20.6.0.19", "versionStartIncluding": "20.6.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC86B936-BF4B-4B5F-A826-E7562A0CE09B", "versionEndExcluding": "20.7.0.14", "versionStartIncluding": "20.7.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7754BD4-5D29-4314-B2F2-DC16D757FC16", "versionEndExcluding": "20.8.0.28", "versionStartIncluding": "20.8.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFC2727A-7E45-4436-A543-01283DA1CC68", "versionEndExcluding": "20.10.0.16", "versionStartIncluding": "20.10.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67A2C2E8-BE1D-4A28-8739-C24576FBDAD6", "versionEndExcluding": "20.11.0.27", "versionStartIncluding": "20.11.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "585E6DC9-4009-4AC5-847C-606843ED7EA6", "versionEndExcluding": "21.1.0.14", "versionStartIncluding": "21.1.0.0" }, { "criteria": "cpe:2.3:a:vmware:workspace_one_unified_endpoint_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DFD8AC9-3200-441F-9037-C0871672F38D", "versionEndExcluding": "21.2.0.8", "versionStartIncluding": "21.2.0.0" } ], "operator": "OR" } ] } ]