What We Do
How We Do
Resources
Company
Partners
Get Started
Security advisories

VMware Remote Code Execution Vulnerability 

February 24, 2021 | 1 MIN READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

On February 23rd, 2021, VMware disclosed a critical vulnerability impacting vCenter Servers. The vulnerability, tracked as CVE-2021-21972, allows for remote code execution and if exploited, could result in the full compromise of affected systems. Abuse of this vulnerability does not require authentication or user interaction.

Exploitation of CVE-2021-21972 has not been identified in the wild at this time. Due to the ease of exploitation and high severity (9.8/10), it is likely that threat actors will abuse this vulnerability in the near future. Organizations are recommended to apply the official VMware patch as soon as possible.

What we’re doing about it

What you should do about it

Additional information

CVE-2021-21972 is due to issues found in the vSphere Client (HTML5) in vCenter Server plugin. Confirmed impacted vCenter Servers include versions 6.5, 6.7, and 7.

Proof-of-Concept (POC) code and technical details for CVE-2021-21972 were released on February 24th. This release will decrease the amount of time before exploitation occurs in the wild.

In an attack scenario, a threat actor with network access to port 443 could exploit this issue. The threat actor would then be able to execute commands on the vulnerable system with unrested privileges. No previous authentication or privileges are required.

In the same release, VMware announced patches for two other vulnerabilities:

References:

[1] https://www.vmware.com/security/advisories/VMSA-2021-0002.html

[2] https://kb.vmware.com/s/article/82374

[3] https://swarm.ptsecurity.com/unauth-rce-vmware/

View Most Recent Advisories