{"id":466,"date":"2021-06-17T23:19:22","date_gmt":"2021-06-18T03:19:22","guid":{"rendered":"https:\/\/eagleassociates.net\/news\/?p=466"},"modified":"2021-06-17T23:19:24","modified_gmt":"2021-06-18T03:19:24","slug":"vulnerability-alert-patch-immediately-if-found","status":"publish","type":"post","link":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/","title":{"rendered":"Vulnerability Alert: <br>PATCH IMMEDIATELY IF FOUND"},"content":{"rendered":"\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) published a notice regarding cyber threat actors that are attempting to exploit CVE-2021-21985, a remote code execution vulnerability in VMware vCenter Server and VMware Cloud Foundation.&nbsp;<\/p>\n\n\n\n<p>Although patches were made\u00a0<a href=\"https:\/\/click.connect.hhs.gov\/?qs=3ab878547a8b667a6979ce691107f6c6e653d88612239029f85dbaf31d3f37167e9eaa9e225c999c65def171215d80f7bad628f657a17cc6\">available<\/a>\u00a0on May 25, 2021, unpatched systems remain an attractive target and attackers can exploit this vulnerability to take control of an unpatched system. VMware vCenter Server and VMware Cloud Foundation are part of the underlying infrastructure for most agencies with on-premises network management.\u00a0<\/p>\n\n\n\n<p>CISA is encouraging private sector organizations, including medical and dental providers, to review VMware\u2019s\u00a0<a href=\"https:\/\/click.connect.hhs.gov\/?qs=3ab878547a8b667a6979ce691107f6c6e653d88612239029f85dbaf31d3f37167e9eaa9e225c999c65def171215d80f7bad628f657a17cc6\">VMSA-21-0010<\/a>,\u00a0<a href=\"https:\/\/click.connect.hhs.gov\/?qs=3ab878547a8b667a9f5c64212edf39f04ff2ec17ac3bd32a2d5103b836f8a6e9294b536d8aa72635e7bda7f5e39f91f8f02206a446c5883c\">blogpost<\/a>,\u00a0and\u00a0<a href=\"https:\/\/click.connect.hhs.gov\/?qs=3ab878547a8b667a743c814ae6693c9ace7b435a8abca0820ddc04e6c91fde8090122e55b872666c8ca000bf110f5be8759ed2fb597f3966\">FAQ\u00a0<\/a>\u00a0for more information about the vulnerability and\u00a0apply\u00a0the\u00a0necessary updates\u00a0as soon as possible, even if it would mean pushing updates outside of your normal patch schedule. \u00a0If\u00a0your organization cannot\u00a0immediately apply\u00a0the update,\u00a0then apply\u00a0the\u00a0<a href=\"https:\/\/click.connect.hhs.gov\/?qs=3ab878547a8b667acda0fda4954604b0e60eabe5ffde5d6d1d818f40d143779115f00487837f9c80eaae99d9b9f2a2a4c77cea05426e87ec\">workarounds<\/a>\u00a0in the interim.<\/p>\n\n\n\n<p>We encourage you to forward the information in this alert to your IT vendor for immediate action.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity and Infrastructure Security Agency (CISA) published a notice regarding cyber threat actors that are attempting to exploit CVE-2021-21985, a remote code execution vulnerability in VMware vCenter Server and VMware Cloud Foundation.&nbsp; Although patches were made\u00a0available\u00a0on May 25, 2021, unpatched systems remain an attractive target and attackers can exploit this vulnerability to take control&#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/\">Continue reading <span class=\"meta-nav\">&#8594;<\/span><\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":467,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[],"class_list":["post-466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eagle-staff"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Alert: PATCH IMMEDIATELY IF FOUND | Eagle Associates News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND | Eagle Associates News\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) published a notice regarding cyber threat actors that are attempting to exploit CVE-2021-21985, a remote code execution vulnerability in VMware vCenter Server and VMware Cloud Foundation.&nbsp; Although patches were made\u00a0available\u00a0on May 25, 2021, unpatched systems remain an attractive target and attackers can exploit this vulnerability to take control... Continue reading &#8594;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/\" \/>\n<meta property=\"og:site_name\" content=\"Eagle Associates News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-18T03:19:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-18T03:19:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2021\/06\/CISA-Alert-July-2021.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"664\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eagle Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eagle Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/\"},\"author\":{\"name\":\"Eagle Staff\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\"},\"headline\":\"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND\",\"datePublished\":\"2021-06-18T03:19:22+00:00\",\"dateModified\":\"2021-06-18T03:19:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/\"},\"wordCount\":167,\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CISA-Alert-July-2021.jpg\",\"articleSection\":[\"eagle associates staff\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/\",\"name\":\"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND | Eagle Associates News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CISA-Alert-July-2021.jpg\",\"datePublished\":\"2021-06-18T03:19:22+00:00\",\"dateModified\":\"2021-06-18T03:19:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CISA-Alert-July-2021.jpg\",\"contentUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CISA-Alert-July-2021.jpg\",\"width\":1000,\"height\":664,\"caption\":\"cisa alert\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2021\\\/06\\\/vulnerability-alert-patch-immediately-if-found\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\",\"name\":\"Eagle Associates News\",\"description\":\"News and More from Eagle Associates, Inc.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\",\"name\":\"Eagle Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"caption\":\"Eagle Staff\"},\"sameAs\":[\"http:\\\/\\\/www.eagleassociates.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND | Eagle Associates News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND | Eagle Associates News","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) published a notice regarding cyber threat actors that are attempting to exploit CVE-2021-21985, a remote code execution vulnerability in VMware vCenter Server and VMware Cloud Foundation.&nbsp; Although patches were made\u00a0available\u00a0on May 25, 2021, unpatched systems remain an attractive target and attackers can exploit this vulnerability to take control... Continue reading &#8594;","og_url":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/","og_site_name":"Eagle Associates News","article_published_time":"2021-06-18T03:19:22+00:00","article_modified_time":"2021-06-18T03:19:24+00:00","og_image":[{"width":1000,"height":664,"url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2021\/06\/CISA-Alert-July-2021.jpg","type":"image\/jpeg"}],"author":"Eagle Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eagle Staff","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#article","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/"},"author":{"name":"Eagle Staff","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9"},"headline":"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND","datePublished":"2021-06-18T03:19:22+00:00","dateModified":"2021-06-18T03:19:24+00:00","mainEntityOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/"},"wordCount":167,"image":{"@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2021\/06\/CISA-Alert-July-2021.jpg","articleSection":["eagle associates staff"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/","url":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/","name":"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND | Eagle Associates News","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#primaryimage"},"image":{"@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2021\/06\/CISA-Alert-July-2021.jpg","datePublished":"2021-06-18T03:19:22+00:00","dateModified":"2021-06-18T03:19:24+00:00","author":{"@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9"},"breadcrumb":{"@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#primaryimage","url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2021\/06\/CISA-Alert-July-2021.jpg","contentUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2021\/06\/CISA-Alert-July-2021.jpg","width":1000,"height":664,"caption":"cisa alert"},{"@type":"BreadcrumbList","@id":"https:\/\/eagleassociates.net\/news\/2021\/06\/vulnerability-alert-patch-immediately-if-found\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eagleassociates.net\/news\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Alert: PATCH IMMEDIATELY IF FOUND"}]},{"@type":"WebSite","@id":"https:\/\/eagleassociates.net\/news\/#website","url":"https:\/\/eagleassociates.net\/news\/","name":"Eagle Associates News","description":"News and More from Eagle Associates, Inc.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eagleassociates.net\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9","name":"Eagle Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","caption":"Eagle Staff"},"sameAs":["http:\/\/www.eagleassociates.net"]}]}},"_links":{"self":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/comments?post=466"}],"version-history":[{"count":2,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/466\/revisions"}],"predecessor-version":[{"id":469,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/466\/revisions\/469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media\/467"}],"wp:attachment":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media?parent=466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/categories?post=466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/tags?post=466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}