Wiz Agents & Workflows are here

CVE-2021-22005
vSphere vCenter Server vulnerability analysis and mitigation

Overview

CVE-2021-22005 is a critical arbitrary file upload vulnerability discovered in VMware vCenter Server's Analytics service. The vulnerability was disclosed on September 21, 2021, affecting VMware vCenter Server versions 6.7 and 7.0. With a CVSS score of 9.8, this critical vulnerability allows malicious actors with network access to port 443 to execute code on vCenter Server by uploading specially crafted files (VMware Advisory, CISA Alert).

Technical details

The vulnerability exists in the Analytics service's Customer Experience Improvement Program (CEIP), which is enabled by default. The root cause relates to user-supplied request parameter mishandling in the CEIP analytics service. Exploitation requires two unauthenticated web requests and can lead to arbitrary file upload capabilities. The vulnerability specifically affects the /analytics/telemetry/ph/api/hyper/send endpoint, where malicious actors can manipulate file paths to achieve code execution. Linux-based deployments are confirmed exploitable, while Windows-based hosts may be more difficult to exploit (Censys Analysis).

Impact

The vulnerability has severe implications as it allows unauthenticated remote code execution with root privileges on affected systems. According to Censys research, over 7,000 VMware vCenter services were exposed on the public internet, with approximately 3,264 hosts potentially vulnerable to this exploit. The vulnerability affects both VMware vCenter Server and VMware Cloud Foundation deployments (Censys Analysis).

Mitigation and workarounds

VMware released patches for affected versions: vCenter Server 7.0 U2c, 6.7 U3o, and Cloud Foundation versions 4.3 and 3.10.2.2. Organizations are strongly urged to apply these updates immediately. If immediate patching is not possible, VMware provided temporary workarounds through KB85717. CISA specifically advised critical infrastructure entities to prioritize patching this vulnerability (VMware Advisory, CISA Alert).

Community reactions

The security community responded rapidly to this vulnerability, with researchers actively sharing detection methods and mitigation strategies. CISA issued an urgent alert regarding the active exploitation of the vulnerability, emphasizing the critical nature of the threat. The widespread exposure of vulnerable systems and the ease of exploitation led to increased attention from both defenders and potential attackers (CISA Alert).

Additional resources


SourceThis report was generated using AI

Related vSphere vCenter Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-38813CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-windows
YesYesSep 17, 2024
CVE-2024-38812CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-windows
YesYesSep 17, 2024
CVE-2024-37080CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 18, 2024
CVE-2024-37081HIGH7.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 18, 2024
CVE-2024-37087MEDIUM5.3
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 25, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management