CVE-2021-22012

7.5 HIGH

📋 TL;DR

CVE-2021-22012 is an information disclosure vulnerability in VMware vCenter Server's unauthenticated appliance management API. Attackers with network access to port 443 can exploit this to access sensitive information without authentication. This affects all organizations running vulnerable vCenter Server versions.

💻 Affected Systems

Products:
  • VMware vCenter Server
Versions: vCenter Server 6.5, 6.7, and 7.0 prior to specific patch versions
Operating Systems: vCenter Server Appliance (VCSA)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects vCenter Server Appliance (VCSA), not Windows-based vCenter Server. The appliance management API is enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of vCenter Server environment including access to configuration data, credentials, and sensitive infrastructure information leading to lateral movement across virtual infrastructure.

🟠

Likely Case

Unauthorized access to sensitive configuration information, system details, and potentially credentials that could be used for further attacks.

🟢

If Mitigated

Limited information exposure with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH - Direct exposure to internet allows unauthenticated attackers to exploit without any network barriers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit if they have network access to vCenter Server.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to the vulnerable API endpoint can trigger the information disclosure. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCenter Server 6.5 U3p, 6.7 U3q, 7.0 U2c or later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0020.html

Restart Required: Yes

Instructions:

1. Download appropriate patch from VMware portal. 2. Backup vCenter Server. 3. Apply patch using vCenter Server Update Manager or CLI. 4. Restart vCenter Server services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to vCenter Server port 443 to trusted management networks only

Firewall Rules

all

Implement firewall rules to block unauthorized access to vCenter Server appliance management API

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vCenter Server from untrusted networks
  • Monitor for unauthorized access attempts to vCenter Server port 443 and investigate any suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check vCenter Server version via vSphere Client or SSH to appliance and run 'vmware -v'

Check Version:

ssh root@vcenter-server 'vmware -v'

Verify Fix Applied:

Verify version is patched (6.5 U3p, 6.7 U3q, 7.0 U2c or later) and test API endpoint access

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to appliance management endpoints
  • Multiple failed authentication attempts followed by successful information disclosure

Network Indicators:

  • Unusual traffic patterns to vCenter Server port 443 from unauthorized sources
  • HTTP requests to /api/appliance/* endpoints without authentication

SIEM Query:

source="vcenter-logs" AND (uri_path="/api/appliance/*" AND http_status=200) AND NOT (src_ip IN [trusted_management_ips])

🔗 References

📤 Share & Export