<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VMware vuln with 9.8 severity rating is under attack in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/VMware-vuln-with-9-8-severity-rating-is-under-attack/m-p/45899#M3231</link>
    <description>&lt;P&gt;For anyone using VMware, a new vulnerability (&lt;SPAN&gt;CVE-2021-21985) resides in theCVE-2021-21985, resides in the vCenter Server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As of Friday (June 4th), there were reports that folks were seeing active scans for it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?amp=1" target="_blank"&gt;https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?amp=1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Jun 2021 21:31:51 GMT</pubDate>
    <dc:creator>dcontesti</dc:creator>
    <dc:date>2021-06-06T21:31:51Z</dc:date>
    <item>
      <title>VMware vuln with 9.8 severity rating is under attack</title>
      <link>https://community.isc2.org/t5/Tech-Talk/VMware-vuln-with-9-8-severity-rating-is-under-attack/m-p/45899#M3231</link>
      <description>&lt;P&gt;For anyone using VMware, a new vulnerability (&lt;SPAN&gt;CVE-2021-21985) resides in theCVE-2021-21985, resides in the vCenter Server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As of Friday (June 4th), there were reports that folks were seeing active scans for it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?amp=1" target="_blank"&gt;https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/?amp=1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jun 2021 21:31:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/VMware-vuln-with-9-8-severity-rating-is-under-attack/m-p/45899#M3231</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2021-06-06T21:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: VMware vuln with 9.8 severity rating is under attack</title>
      <link>https://community.isc2.org/t5/Tech-Talk/VMware-vuln-with-9-8-severity-rating-is-under-attack/m-p/45906#M3233</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;&lt;SPAN&gt;a tool for managing ...&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;execution of malicious code ... on a port that is exposed to the Internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Looks like it is an attack against the admin interface.&amp;nbsp; Rookie mistake to expose those to the Internet.&amp;nbsp; Really they belong on a dedicated, restricted-access Vlan.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 01:24:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/VMware-vuln-with-9-8-severity-rating-is-under-attack/m-p/45906#M3233</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2021-06-07T01:24:07Z</dc:date>
    </item>
  </channel>
</rss>

