CVE-2021-21993
vSphere vCenter Server vulnerability analysis and mitigation

Overview

CVE-2021-21993 is a Server Side Request Forgery (SSRF) vulnerability discovered in VMware vCenter Server Content Library, disclosed in September 2021. The vulnerability affects VMware vCenter Server versions 6.5, 6.7, and 7.0, as well as VMware Cloud Foundation versions 3.x and 4.x. This vulnerability stems from improper validation of URLs in the vCenter Server Content Library (VMware Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Moderate severity), with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability exists due to improper validation of URLs in the vCenter Server Content Library component (NVD, VMware Advisory).

Impact

When successfully exploited, this vulnerability can lead to information disclosure. The impact is limited as it requires an authorized user with access to the content library to exploit (VMware Advisory).

Mitigation and workarounds

VMware has released patches to address this vulnerability in the following versions: vCenter Server 7.0 U2c, 6.7 U3o, and 6.5 U3q. For Cloud Foundation, the fixes are available in versions 4.3 and 3.10.2.2. No workarounds are available, making it essential to apply the provided patches (VMware Advisory).

Community reactions

The vulnerability was discovered and reported independently by Osama Alaa of Malcrove and vitquay of Vantage Point Security. While this vulnerability was part of a larger security advisory that included multiple vulnerabilities in vCenter Server, it received relatively less attention due to its moderate severity rating and limited exploit potential (Hacker News).

Additional resources


SourceThis report was generated using AI

Related vSphere vCenter Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-38813CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
YesYesSep 17, 2024
CVE-2024-38812CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
YesYesSep 17, 2024
CVE-2024-37080CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 18, 2024
CVE-2024-37081HIGH7.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 18, 2024
CVE-2024-37087MEDIUM5.3
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 25, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management