CVE-2021-21998

9.8 CRITICAL

📋 TL;DR

CVE-2021-21998 is an authentication bypass vulnerability in VMware Carbon Black App Control that allows attackers with network access to the management server to gain administrative privileges without valid credentials. This affects organizations using vulnerable versions of the software for endpoint security management. Attackers could completely compromise the security product meant to protect endpoints.

💻 Affected Systems

Products:
  • VMware Carbon Black App Control
Versions: 8.0, 8.1, 8.5 prior to 8.5.8, 8.6 prior to 8.6.2
Operating Systems: Windows Server (management server)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the management server component. Endpoint agents are not directly vulnerable but can be compromised through management server control.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Carbon Black App Control management server, allowing attackers to disable security controls, deploy malware, exfiltrate sensitive data, and pivot to other systems in the network.

🟠

Likely Case

Attackers gain administrative access to modify security policies, whitelist malicious applications, disable endpoint protection, and potentially deploy ransomware or other malware across managed endpoints.

🟢

If Mitigated

Limited impact if management server is properly segmented and access is restricted, though authentication bypass still presents significant risk to the security infrastructure.

🌐 Internet-Facing: HIGH - If the management server is exposed to the internet, attackers can remotely exploit this without authentication to gain administrative control.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the management server can bypass authentication and gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit once the attack vector is understood. No authentication required makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.5.8 for 8.5.x, 8.6.2 for 8.6.x

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0012.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from VMware support portal. 2. Backup current configuration. 3. Apply patch following VMware documentation. 4. Restart the Carbon Black App Control management server. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Carbon Black App Control management server to only trusted administrative networks and required management interfaces.

Access Control Lists

all

Implement strict firewall rules and network ACLs to limit which IP addresses can communicate with the management server on all ports.

🧯 If You Can't Patch

  • Immediately isolate the Carbon Black App Control management server from all non-essential networks and implement strict network segmentation
  • Implement additional authentication layers such as VPN or jump host requirements for accessing the management interface

🔍 How to Verify

Check if Vulnerable:

Check the Carbon Black App Control management server version in the web interface under Help > About or via the server console.

Check Version:

On Windows server: Check application version in Control Panel > Programs and Features or via the web interface.

Verify Fix Applied:

Verify the version shows 8.5.8 or higher for 8.5.x branches, or 8.6.2 or higher for 8.6.x branches. Test authentication requirements for administrative functions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication bypass patterns
  • Administrative actions from unexpected IP addresses
  • Configuration changes without proper authentication logs

Network Indicators:

  • Direct connections to management server from unauthorized networks
  • Unusual API calls to administrative endpoints without authentication headers

SIEM Query:

source="carbonblack" AND (event_type="admin_action" AND NOT auth_success="true") OR (src_ip NOT IN [admin_networks] AND dest_ip=[cb_server_ip])

🔗 References

📤 Share & Export