Quantcast
Channel: Tenable Blog
Viewing all articles
Browse latest Browse all 1935

CVE-2021-22005: Critical File Upload Vulnerability in VMware vCenter Server

$
0
0

VMware published an advisory addressing 19 vulnerabilities, including one critical flaw in vCenter Server that is reportedly simple to exploit.

Background

On September 21, VMware published a security advisory addressing 19 vulnerabilities in vCenter Server, its centralized management software for VMware vSphere systems. The full list of vulnerabilities patched includes:

CVEDescriptionCVSSv3
CVE-2021-22005vCenter Server file upload vulnerability9.8
CVE-2021-21991vCenter Server local privilege escalation vulnerability8.8
CVE-2021-22006vCenter Server reverse proxy bypass vulnerability8.3
CVE-2021-22011vCenter server unauthenticated API endpoint vulnerability8.1
CVE-2021-22015vCenter Server improper permission local privilege escalation vulnerabilities7.8
CVE-2021-22012vCenter Server unauthenticated API information disclosure vulnerability7.5
CVE-2021-22013vCenter Server file path traversal vulnerability7.5
CVE-2021-22016vCenter Server reflected XSS vulnerability7.5
CVE-2021-22017vCenter Server rhttpproxy bypass vulnerability7.3
CVE-2021-22014vCenter Server authenticated code execution vulnerability7.2
CVE-2021-22018vCenter Server file deletion vulnerability6.5
CVE-2021-21992vCenter Server XML parsing denial-of-service vulnerability6.5
CVE-2021-22007vCenter Server local information disclosure vulnerability5.5
CVE-2021-22019vCenter Server denial of service vulnerability5.3
CVE-2021-22009vCenter Server VAPI multiple denial of service vulnerabilities5.3
CVE-2021-22010vCenter Server VPXD denial of service vulnerability5.3
CVE-2021-22008vCenter Server information disclosure vulnerability5.3
CVE-2021-22020vCenter Server Analytics service denial-of-service Vulnerability5.0
CVE-2021-21993vCenter Server SSRF vulnerability4.3

Source: VMware, September 2021

In addition to publishing the security advisory, VMware published a blog post and a Questions and Answers post addressing some foundational questions about the advisory. Of the 19 vulnerabilities, only CVE-2021-22005 was assigned a severity of Critical.

Source: Tenable, 2021

Analysis

CVE-2021-22005 is a file upload vulnerability in the vCenter Server. An unauthenticated attacker capable of accessing port 443 over the same network or directly from the internet could exploit a vulnerable vCenter Server by uploading a file to the vCenter Server analytics service. Successful exploitation would result in remote code execution on the host. In its blog post, VMware notes that this vulnerability exists in vCenter Server “regardless of the configuration settings,” which makes this exploitable by default in affected vCenter Server installations.

While the remainder of the vulnerabilities patched in today’s release aren’t critical, they are split evenly between Important and Moderate severity flaws. The remaining vulnerabilities vary, from privilege escalation and denial of service to information disclosure and path traversal vulnerabilities. These flaws will likely be valuable to attackers, particularly affiliates of ransomware groups, that have already compromised a network through other means.

This is the second time in the last four months that VMware issued a patch for a critical flaw affecting vCenter/vSphere. In May, VMWare disclosed CVE-2021-21985, a remote code execution vulnerability in VMware’s vSphere Client.

Security researcher Allan Liska tweeted that CVE-2021-21985 has already been leveraged as part of ransomware attacks and that CVE-2021-22005 “looks even worse.”

Researchers stress urgency to patch as the vulnerability is “trivial to execute”

Derek Abdine, chief technology officer for Censys, tweeted that he discovered the vulnerable code path for this vulnerability and that it “looks stunningly trivial to execute.” As a result, Abdine added that users should “Patch now.”

Proof of concept

At the time this blog post was published, there were no publicly available proof-of-concept (PoC) scripts for CVE-2021-22005. However, Abdine’s warning implies that we may see PoC released shortly.

Solution

To address the 19 vulnerabilities disclosed in its advisory, VMware released patches for vCenter Server 7.0, 6.7 and 6.5. For a full breakdown of which CVEs are addressed in each release, please refer to the VMware advisory page.

For CVE-2021-22005, the following is a breakdown of the vCenter Server version, associated fixed version as well as the installation addressed.

Version of vCenter Server Fixed VersionInstallation
7.07.0 U2cAny
6.76.7 U3oVirtual Appliance

Please note that vCenter Server version 6.7 for Windows and version 6.5 for any installation are not affected by CVE-2021-22005.

Organizations are strongly encouraged to apply these patches as soon as possible.

If patching is not feasible at this time, VMware has provided workaround instructions for CVE-2021-22005. However, the workaround should be considered a temporary solution and should not be a replacement for upgrading to a fixed version.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 30-day trial of Tenable.io Vulnerability Management.


Viewing all articles
Browse latest Browse all 1935

Trending Articles