CVE-2021-22013
vSphere vCenter Server vulnerability analysis and mitigation

Overview

CVE-2021-22013 is a file path traversal vulnerability discovered in VMware vCenter Server's appliance management API. The vulnerability was disclosed on September 21, 2021, and affects vCenter Server 6.5. VMware evaluated this vulnerability with a CVSSv3 base score of 7.5, categorizing it in the Important severity range (VMware Advisory).

Technical details

The vulnerability exists in the appliance management API of vCenter Server, allowing path traversal that leads to information disclosure. The vulnerability is accessible through network access to port 443 on vCenter Server. It received a CVSS v3.1 base score of 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity with network attack vector, low attack complexity, and no required privileges or user interaction (NVD).

Impact

A successful exploitation of this vulnerability allows a malicious actor with network access to port 443 on vCenter Server to gain access to sensitive information. The vulnerability specifically impacts the confidentiality of the system, with potential exposure of sensitive data (VMware Advisory).

Mitigation and workarounds

VMware has released patches to address this vulnerability. For vCenter Server 6.5, users should update to version 6.5 U3q. No workarounds are available for this vulnerability, making it critical to apply the security patches as soon as possible (VMware Advisory).

Community reactions

The vulnerability was discovered and reported by George Noseevich (@webpentest) and Sergey Gerasimov of SolidLab LLC. It was part of a larger security advisory (VMSA-2021-0020) that addressed multiple vulnerabilities in vCenter Server (Hacker News).

Additional resources


SourceThis report was generated using AI

Related vSphere vCenter Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-38813CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
YesYesSep 17, 2024
CVE-2024-38812CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
YesYesSep 17, 2024
CVE-2024-37080CRITICAL9.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 18, 2024
CVE-2024-37081HIGH7.8
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 18, 2024
CVE-2024-37087MEDIUM5.3
  • vSphere vCenter ServervSphere vCenter Server
  • vcenter-server-linux
NoYesJun 25, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management