Vulnerability Description
VMware Workspace one UEM console (2102 prior to 21.2.0.8, 2101 prior to 21.1.0.14, 2011 prior to 20.11.0.27, 2010 prior to 20.10.0.16,2008 prior to 20.8.0.28, 2007 prior to 20.7.0.14,2006 prior to 20.6.0.19, 2005 prior to 20.5.0.46, 2004 prior to 20.4.0.21, 2003 prior to 20.3.0.23, 2001 prior to 20.1.0.32, 1912 prior to 19.12.0.24) contain a cross-site scripting vulnerability. VMware Workspace ONE UEM console does not validate incoming requests during device enrollment after leading to rendering of unsanitized input on the user device in response.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Workspace One Unified Endpoint Management | >= 19.0.0.0, < 19.12.0.24 |
Related Weaknesses (CWE)
References
- https://herolab.usd.de/security-advisories/usd-2021-0008/ExploitThird Party Advisory
- https://www.vmware.com/security/advisories/VMSA-2021-0008.htmlVendor Advisory
- https://herolab.usd.de/security-advisories/usd-2021-0008/ExploitThird Party Advisory
- https://www.vmware.com/security/advisories/VMSA-2021-0008.htmlVendor Advisory
FAQ
What is CVE-2021-21990?
CVE-2021-21990 is a vulnerability with a CVSS score of 6.1 (MEDIUM). VMware Workspace one UEM console (2102 prior to 21.2.0.8, 2101 prior to 21.1.0.14, 2011 prior to 20.11.0.27, 2010 prior to 20.10.0.16,2008 prior to 20.8.0.28, 2007 prior to 20.7.0.14,2006 prior to 20....
How severe is CVE-2021-21990?
CVE-2021-21990 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-21990?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Workspace One Unified Endpoint Management.