Security News > 2021 > September > Working exploit released for VMware vCenter CVE-2021-22005 bug

Working exploit released for VMware vCenter CVE-2021-22005 bug
2021-09-28 11:03

A complete exploit for the remote code execution vulnerability in VMware vCenter tracked as CVE-2021-22005 is now widely available, and threat actors are taking advantage of it.

On Monday, exploit writer wvu released an unredacted exploit for CVE-2021-22005 that works against endpoints with the Customer Experience Improvement Program component enabled, which is the default state.

VMware describes the vulnerability as being exploitable "By anyone who can reach vCenter Server over the network to gain access, regardless of the configuration settings of vCenter Server."

VMware's advisory states that CVE-2021-22005 could be exploited "By anyone who can reach vCenter Server over the network," results from search engines indexing machines exposed on the public internet showed thousands of VMware vCenter hosts accessible over the web.

In an advisory on Friday, CISA also urged critical infrastructure organizations with vulnerable vCenter servers to prioritize updating the machines or to apply the temporary workaround from VMware.

Threat actors have shown interest in this vulnerability early on, just hours after VMware disclosed it, and they quickly built a working exploit from the incomplete code that security researcher Jang released last week along with some technical notes.


News URL

https://www.bleepingcomputer.com/news/security/working-exploit-released-for-vmware-vcenter-cve-2021-22005-bug/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-09-23 CVE-2021-22005 Path Traversal vulnerability in VMWare Cloud Foundation and Vcenter Server
The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service.
network
low complexity
vmware CWE-22
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Vmware 146 11 222 256 102 591