Vulnerability Details : CVE-2021-21985
Public exploit exists!
Used for ransomware!
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Vulnerability category: Input validationExecute code
CVE-2021-21985 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
VMware vCenter Server Improper Input Validation Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
VMware vSphere Client contains an improper input validation vulnerability in the Virtual SAN Health Check plug-in, which is enabled by default in vCenter Server, which allows for remote code execution.
Added on
2021-11-03
Action due date
2021-11-17
Exploit prediction scoring system (EPSS) score for CVE-2021-21985
Probability of exploitation activity in the next 30 days: 97.39%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2021-21985
-
VMware vCenter Server Virtual SAN Health Check Plugin RCE
Disclosure Date: 2021-05-25First seen: 2021-07-12exploit/linux/http/vmware_vcenter_vsan_health_rceThis module exploits Java unsafe reflection and SSRF in the VMware vCenter Server Virtual SAN Health Check plugin's ProxygenController class to execute code as the vsphere-ui user. See the vendor advisory for affected and patched versions. Tested a
CVSS scores for CVE-2021-21985
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2021-21985
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-21985
-
https://www.vmware.com/security/advisories/VMSA-2021-0010.html
Access DeniedVendor Advisory
-
http://packetstormsecurity.com/files/163487/VMware-vCenter-Server-Virtual-SAN-Health-Check-Remote-Code-Execution.html
VMware vCenter Server Virtual SAN Health Check Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/162812/VMware-Security-Advisory-2021-0010.html
VMware Security Advisory 2021-0010 ≈ Packet StormThird Party Advisory;VDB Entry
Products affected by CVE-2021-21985
- cpe:2.3:a:vmware:vcenter_server:6.5:e:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:f:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3b:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3f:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3g:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3j:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3l:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:6.7:update3m:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*
- cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*