⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2021-11-17.

CVE-2021-22005Path Traversal in Vmware Vcenter Server

Severity
9.8CRITICALNVD
EPSS
94.5%
top < 0.01%
CISA KEV
KEVRansomware
Added 2021-11-03
Due 2021-11-17
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 23
KEV addedNov 3
KEV dueNov 17
Latest updateMay 2
CISA Required Action: Apply updates per vendor instructions.

Description

The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDvmware/vcenter_server6.5, 6.7, 7.0+2
NVDvmware/cloud_foundation3.05.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9w75-994h-2j26: The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service2022-05-24
CVEList
CVE-2021-22005: The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service2021-09-23
VulnCheck
VMware vCenter Server File Upload Vulnerability2021

💥Exploits & PoCs

2
Nuclei
VMware Detection
Nuclei
VMware vCenter Server - Arbitrary File Upload

🔍Detection Rules

1
Suricata
ET EXPLOIT VMware vCenter RCE Exploitation Attempt M2 (CVE-2021-22005)2021-09-28

📋Vendor Advisories

2
CISA
VMware vCenter Server File Upload Vulnerability2021-11-03
VMware
VMware vCenter Server updates address multiple security vulnerabilities2021-09-21

🕵️Threat Intelligence

1
Unit42
Network Security Trends: November 2022-January 20232023-05-02
CVE-2021-22005 — Path Traversal in Vmware | cvebase