A privilege escalation vulnerability in VMware NSX-T was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware product.
Known Attack Vectors
Successful exploitation of this issue may allow attackers with local guest user account to assign privileges higher than their own permission level.
To remediate CVE-2021-21981 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.
Workarounds for CVE-2021-21981 have been listed in the 'Workarounds' column of the 'Response Matrix' below.
 To exploit this issue, NSX Enterprise administrator must activate the local guest user account. It is not activated by default.
 This issue affects only version 3.1.1. Other versions are not affected.
VMware NSX-T 3.1.2
Downloads and Documentation:
Mitre CVE Dictionary Links:
FIRST CVSSv3 Calculator:
Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2021 VMware Inc. All rights reserved.