• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

VMware vCenter Exploit - CVE-2021-21972

Risk Factors

This vCenter vulnerability is well known. A successful exploit requires skills and reconnaissance. An unauthenticated attacker with network access to a vulnerable device can gain complete control of a device, providing an entry point for further attacks on your network.

Kill Chain

Exploitation

Risk Score

88

Detection diagram
Next in Exploitation: VMware vCenter Exploit - CVE-2021-21985

Attack Background

The VMware vSphere Client (HTML5) component of VMware vCenter enables management of virtual environments for Windows and Linux hosts. vCenter has plugins that manage authorization for vSphere Client connections. A vulnerability in the vRealize Operations (vROPS) plugin allows an unauthenticated attacker with network access to a vSphere Client to upload malicious files to the vCenter server. After scanning the target to confirm the presence of the vulnerability, the attacker sends an HTTP POST request with a malicious TAR file to the /uploadova endpoint. Normally, the vROPS plugin decompresses and writes the file content to a restricted directory. But the malicious archive file includes directory traversal fragments, which force the vROPS plugin to write the file content to a directory that the unauthenticated attacker can access. After the vCenter server sends an HTTP response with a success message, the attacker can leverage the malicious file content to install a web shell, exfiltrate data, or perform actions on the vCenter server.

Mitigation Options

Upgrade to a fixed version, or configure devices to mitigate CVE-2021-21972

MITRE ATT&CK ID

What else can RevealX do for you?