Security News > 2021 > February > Vulnerability in VMware vSphere Replication Can Facilitate Attacks on Enterprises

VMware last week informed customers about the availability of patches for a potentially serious vulnerability affecting its vSphere Replication product.
vSphere Replication, a VMware vSphere component, is a virtual machine replication engine designed for data protection and disaster recovery.
VMware has told customers that several versions of the product are affected by a high-severity command injection vulnerability that can be exploited by a hacker with admin privileges to execute shell commands on the underlying system.
Patches have been released for each of the affected versions of vSphere Replication.
"When carrying out an attack on a company infrastructure, an attacker can detect the VMware vSphere Replication instance at the perimeter of its network and, as the used password is weak, for example, he can guess credentials to enter the administrator interface," Dimitrenko explained.
"After gaining authorized access, the attacker will be able to exploit this vulnerability and execute arbitrary commands on the server with maximum privileges."
News URL
Related news
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Broadcom fixes three VMware zero-days exploited in attacks (source)
- Over 37,000 VMware ESXi servers vulnerable to ongoing attacks (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks (source)
- CISA Warns of CentreStack's Hard-Coded MachineKey Vulnerability Enabling RCE Attacks (source)
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054) (source)