• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

VMware vCenter Exploit - CVE-2021-21985

Risk Factors

This vCenter plugin vulnerability is well known and requires network access to port 443 on a vCenter server. An unauthenticated attacker can leverage public exploit code to gain complete control of a device or escalate privileges to spread malware, such as ransomware, across the network.

Kill Chain

Exploitation

Risk Score

83

Detection diagram
Next in Exploitation: VMware vCenter Exploit - CVE-2021-22005

Attack Background

The VMware vSphere Client (HTML5) component of VMware vCenter enables the management of virtual environments for Windows and Linux hosts. vCenter has default plugins that monitor vSphere Client connections. A vulnerability in the Virtual SAN Health Check plugin (which is enabled by default) allows an unauthenticated attacker to successfully access classes and methods from a vulnerable endpoint (/ui/h5-vsan/rest/proxy/service) on port 443. The attacker can leverage vulnerable endpoints to look up a malicious class on the victim server, resulting in remote code execution (RCE) on the vCenter server through Java Naming and Directory Interface (JNDI) injection.

Mitigation Options

Install patches for relevant versions

MITRE ATT&CK ID

What else can RevealX do for you?