VMware had released a urgent advisory requesting customers to fix multiple vulnerabilities reported on its VMware VCenter products. Among which ,the file upload vulnerability seems to be the most critical with CVSS score of 9.8 which can allow the remote attacker with access to 443 port can upload maliciously crafted file for compromising the target machine.

“The VMSA outlines a number of issues that are resolved in this patch release. The most urgent addresses CVE-2021-22005, a file upload vulnerability that can be used to execute commands and software on the vCenter Server Appliance. This vulnerability can be used by anyone who can reach vCenter Server over the network to gain access, regardless of the configuration settings of vCenter Server.” reports the advisory.

Server Management Software - vCenter Server | VMware

Additional vulnerabilities which needs to be patched are listed below:

  1. CVE-2021-22005 (CVSS score: 9.8) – vCenter Server file upload vulnerability
  2. CVE-2021-21991 (CVSS score: 8.8) – vCenter Server local privilege escalation vulnerability
  3. CVE-2021-22006 (CVSS score: 8.3) – vCenter Server reverse proxy bypass vulnerability
  4. CVE-2021-22011 (CVSS score: 8.1) – vCenter server unauthenticated API endpoint vulnerability
  5. CVE-2021-22015 (CVSS score: 7.8) – vCenter Server improper permission local privilege escalation vulnerabilities
  6. CVE-2021-22012 (CVSS score: 7.5) – vCenter Server unauthenticated API information disclosure vulnerability
  7. CVE-2021-22013 (CVSS score: 7.5) – vCenter Server file path traversal vulnerability
  8. CVE-2021-22016 (CVSS score: 7.5) – vCenter Server reflected XSS vulnerability
  9. CVE-2021-22017 (CVSS score: 7.3) – vCenter Server rhttpproxy bypass vulnerability
  10. CVE-2021-22014 (CVSS score: 7.2) – vCenter Server authenticated code execution vulnerability
  11. CVE-2021-22018 (CVSS score: 6.5) – vCenter Server file deletion vulnerability
  12. CVE-2021-21992 (CVSS score: 6.5) – vCenter Server XML parsing denial-of-service vulnerability
  13. CVE-2021-22007 (CVSS score: 5.5) – vCenter Server local information disclosure vulnerability
  14. CVE-2021-22019 (CVSS score: 5.3) – vCenter Server denial of service vulnerability
  15. CVE-2021-22009 (CVSS score: 5.3) – vCenter Server VAPI multiple denial of service vulnerabilities
  16. CVE-2021-22010 (CVSS score: 5.3) – vCenter Server VPXD denial of service vulnerability
  17. CVE-2021-22008 (CVSS score: 5.3) – vCenter Server information disclosure vulnerability
  18. CVE-2021-22020 (CVSS score: 5.0) – vCenter Server Analytics service denial-of-service vulnerability
  19. CVE-2021-21993 (CVSS score: 4.3) – vCenter Server SSRF vulnerability

“First, if you can patch vCenter Server, do it. In general, this is the fastest way to resolve this problem, doesn’t involve editing files on the vCenter Server Appliance (VCSA), and removes the vulnerabilities completely. Patching also carries less technical debt and less risk than using a workaround.” noted in the advisory.

Detailed Advisory on file upload vulnerability here.

If you can’t patch right away there are workarounds linked from the VMSA for the critical vulnerability, but only the critical vulnerability. This involves editing a text file on the VCSA and restarting services and is documented as part of the VMSA link above.” adds to the advisory.

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s