Security News > 2021 > September > Hackers exploiting critical VMware vCenter CVE-2021-22005 bug
Exploit code that could be used for remote code execution on VMware vCenter Server vulnerable to CVE-2021-22005 has been released today and attackers are already using it.
Publicly disclosed earlier this week when VMware also addressed it, the bug comes with a critical severity rating of 9.8 and a strong recommendation to install the available patch.
Signs of these attacks coming were seen shortly after VMware disclosed the security issue and released a patch.
Jang published technical notes for CVE-2021-22005 based on the workaround and the patch from VMware.
Currently, search engines for internet-connected devices show thousands of VMware vCenter Server instances exposed to the public internet.
Update : Shortly after publishing, BleepingComputer learned that hackers have started to exploit CVE-2021-22005 using code released by security researcher Jang.
News URL
Related news
- Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products (source)
- Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade (source)
- Hackers exploit critical RCE flaw in Bricks WordPress site builder (source)
- VMware Alert: Uninstall EAP Now - Critical Flaw Puts Active Directory at Risk (source)
- VMware fixes critical sandbox escape flaws in ESXi, Workstation, and Fusion (source)
- VMware patches critical flaws in ESXi, Workstation, Fusion and Cloud Foundation (source)
- CISA shares critical infrastructure defense tips against Chinese hackers (source)
- US sanctions APT31 hackers behind critical infrastructure attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-23 | CVE-2021-22005 | Path Traversal vulnerability in VMWare Cloud Foundation and Vcenter Server The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. | 9.8 |