
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-22005 is a critical arbitrary file upload vulnerability discovered in VMware vCenter Server's Analytics service. The vulnerability was disclosed on September 21, 2021, affecting VMware vCenter Server versions 6.7 and 7.0. With a CVSS score of 9.8, this critical vulnerability allows malicious actors with network access to port 443 to execute code on vCenter Server by uploading specially crafted files (VMware Advisory, CISA Alert).
The vulnerability exists in the Analytics service's Customer Experience Improvement Program (CEIP), which is enabled by default. The root cause relates to user-supplied request parameter mishandling in the CEIP analytics service. Exploitation requires two unauthenticated web requests and can lead to arbitrary file upload capabilities. The vulnerability specifically affects the /analytics/telemetry/ph/api/hyper/send endpoint, where malicious actors can manipulate file paths to achieve code execution. Linux-based deployments are confirmed exploitable, while Windows-based hosts may be more difficult to exploit (Censys Analysis).
The vulnerability has severe implications as it allows unauthenticated remote code execution with root privileges on affected systems. According to Censys research, over 7,000 VMware vCenter services were exposed on the public internet, with approximately 3,264 hosts potentially vulnerable to this exploit. The vulnerability affects both VMware vCenter Server and VMware Cloud Foundation deployments (Censys Analysis).
VMware released patches for affected versions: vCenter Server 7.0 U2c, 6.7 U3o, and Cloud Foundation versions 4.3 and 3.10.2.2. Organizations are strongly urged to apply these updates immediately. If immediate patching is not possible, VMware provided temporary workarounds through KB85717. CISA specifically advised critical infrastructure entities to prioritize patching this vulnerability (VMware Advisory, CISA Alert).
The security community responded rapidly to this vulnerability, with researchers actively sharing detection methods and mitigation strategies. CISA issued an urgent alert regarding the active exploitation of the vulnerability, emphasizing the critical nature of the threat. The widespread exposure of vulnerable systems and the ease of exploitation led to increased attention from both defenders and potential attackers (CISA Alert).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."