Critical vCenter Server File Upload Vulnerability (CVE-2021-22005)

Critical vCenter Server File Upload Vulnerability (CVE-2021-22005)

Description


On Tuesday, September 21, 2021, VMware published security advisory VMSA-2021-0020, which includes details on CVE-2021-22005, a critical file upload vulnerability (CVSSv3 9.8) in vCenter Server that allows remote code execution (RCE) on the appliance. Successful exploitation of this vulnerability is achieved simply by uploading a specially crafted file via port 433 “regardless of the configuration settings of vCenter Server.”


VMware has published an FAQ outlining the details of this vulnerability and makes it clear that this should be patched “immediately.” A workaround is also being provided by VMware — however, its use is not being recommended and should only be used as a temporary solution.


Affected products


vCenter Server versions 6.7 and 7.0
Cloud Foundation (vCenter Server) 3.x, 4.x

Guidance


We echo VMware’s advice that impacted servers should be patched right away. While there are currently no reports of exploitation, we expect this to quickly change within days — just as previous critical vCenter vulnerabilities did (CVE-2021-21985, CVE-2021-21972). Additionally, Rapid7 recommends that, as a general practice, network access to critical organizational infrastructure only be allowed via VPN and never open to the public internet.


We will update this post as more information becomes available, such as information on exploitation.


Rapid7 customers


A vulnerability check for CVE-2021-22005 is under development and will be available to InsightVM and Nexpose customers in an upcoming content release pending the QA process.


In the meantime, InsightVM customers can use critical vcenter server upload vulnerability 22005