VMware is telling partners and customers to patch a critical vCenter Server vulnerability that is present in all vCenter Server Deployments, according to a VMware security advisory.The vulnerability, tracked as CVE-2021-21985, involves vCenter Server versions 6.5, 6.7 and 7.0. Given the severity of the vulnerability, VMware has strongly recommended that partners and customers mitigate the issue, according to Bob Plankers,The fixes, VMware says, address the following two issues:First, there is a remote code execution vulnerability in the vSAN plugin, which ships as part of vCenter Server. This vulnerability can be used by anyone who can reach vCenter Server over the network to gain access, regardless of whether you use vSAN or not. Second, improvements were made to the vCenter Server plugin framework to better enforce plugin authentication.