Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
On February 23rd, 2021, VMware disclosed a critical vulnerability impacting vCenter Servers. The vulnerability, tracked as CVE-2021-21972, allows for remote code execution and if exploited, could result in the full compromise of affected systems. Abuse of this vulnerability does not require authentication or user interaction.
Exploitation of CVE-2021-21972 has not been identified in the wild at this time. Due to the ease of exploitation and high severity (9.8/10), it is likely that threat actors will abuse this vulnerability in the near future. Organizations are recommended to apply the official VMware patch as soon as possible.
What we’re doing about it
What you should do about it
CVE-2021-21972 is due to issues found in the vSphere Client (HTML5) in vCenter Server plugin. Confirmed impacted vCenter Servers include versions 6.5, 6.7, and 7.
Proof-of-Concept (POC) code and technical details for CVE-2021-21972 were released on February 24th. This release will decrease the amount of time before exploitation occurs in the wild.
In an attack scenario, a threat actor with network access to port 443 could exploit this issue. The threat actor would then be able to execute commands on the vulnerable system with unrested privileges. No previous authentication or privileges are required.
In the same release, VMware announced patches for two other vulnerabilities: