CVE-2021-21991

7.8 HIGH

📋 TL;DR

CVE-2021-21991 is a local privilege escalation vulnerability in VMware vCenter Server that allows authenticated non-administrative users to gain Administrator privileges. This affects vSphere Client (HTML5) and vCenter Server vSphere Web Client (FLEX/Flash). Organizations using vulnerable vCenter Server versions are at risk.

💻 Affected Systems

Products:
  • VMware vCenter Server
Versions: vCenter Server 6.5, 6.7, and 7.0 before specific patch versions
Operating Systems: Windows, Linux (vCenter Server Appliance)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both vCenter Server for Windows and vCenter Server Appliance (VCSA). Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with valid user credentials gains full administrative control over vCenter Server, potentially compromising the entire virtual infrastructure, deploying malicious VMs, accessing sensitive data, and persisting access.

🟠

Likely Case

Malicious insider or compromised user account escalates to administrator, gains control over virtual machines and infrastructure, and potentially moves laterally to other systems.

🟢

If Mitigated

With proper network segmentation, least privilege access, and monitoring, impact is limited to the vCenter Server itself with detection of privilege escalation attempts.

🌐 Internet-Facing: HIGH if vCenter Server is exposed to the internet, as attackers can target user credentials through phishing or credential stuffing.
🏢 Internal Only: HIGH as authenticated users (including compromised accounts) can exploit this from within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but is relatively straightforward once authenticated. Multiple security researchers have published proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCenter Server 6.5 U3n, 6.7 U3o, 7.0 U2b or later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0020.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from VMware Customer Connect portal. 2. Backup vCenter Server configuration and database. 3. Apply the patch using vCenter Server Update Manager or manual installer. 4. Restart vCenter Server services or the entire server as required.

🔧 Temporary Workarounds

Restrict User Access

all

Limit non-administrative user access to vCenter Server to only essential personnel and implement strict access controls.

Network Segmentation

all

Isolate vCenter Server management network from general user networks and implement firewall rules to restrict access.

🧯 If You Can't Patch

  • Implement strict least privilege access controls and monitor all user activity on vCenter Server
  • Deploy network segmentation and isolate vCenter Server from general user networks

🔍 How to Verify

Check if Vulnerable:

Check vCenter Server version via vSphere Client: Navigate to Menu > Administration > Deployment > System Configuration > Nodes. Vulnerable if version is 6.5 before U3n, 6.7 before U3o, or 7.0 before U2b.

Check Version:

On vCenter Server Appliance: shell> cat /etc/vmware-release. On Windows: Check Programs and Features or vCenter Server installer logs.

Verify Fix Applied:

Verify version is 6.5 U3n or later, 6.7 U3o or later, or 7.0 U2b or later. Test with non-admin user attempting privilege escalation actions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in vCenter Server logs
  • Multiple failed authentication attempts followed by successful login and privilege changes
  • User accounts performing administrative actions without prior history

Network Indicators:

  • Unusual authentication patterns to vCenter Server
  • Multiple user sessions from same account with different privilege levels

SIEM Query:

source="vcenter" AND (event_type="privilege_escalation" OR (user_change="*" AND privilege_level="Administrator"))

🔗 References

📤 Share & Export