CVE-2021-22023

7.2 HIGH

📋 TL;DR

This vulnerability allows an attacker with administrative API access to vRealize Operations Manager to modify other users' information, potentially leading to account takeover. It affects vRealize Operations Manager 8.x versions prior to 8.5. Only users with administrative API access can exploit this vulnerability.

💻 Affected Systems

Products:
  • VMware vRealize Operations Manager
Versions: 8.x prior to 8.5
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with administrative API access enabled; default installations may have this enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts, privilege escalation to full system control, and potential lateral movement within the environment.

🟠

Likely Case

Targeted account takeover of specific users, privilege escalation, and unauthorized access to sensitive data.

🟢

If Mitigated

Limited impact due to restricted administrative access, proper network segmentation, and monitoring of API activity.

🌐 Internet-Facing: HIGH if administrative API is exposed to the internet without proper authentication and network controls.
🏢 Internal Only: MEDIUM as it requires administrative API access, but internal threats or compromised accounts could exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative API credentials; no public proof-of-concept has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vRealize Operations Manager 8.5 or later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0018.html

Restart Required: Yes

Instructions:

1. Download vRealize Operations Manager 8.5 or later from VMware. 2. Follow VMware's upgrade documentation to apply the patch. 3. Restart the system as required after patching.

🔧 Temporary Workarounds

Restrict Administrative API Access

all

Limit access to the administrative API to trusted IP addresses or networks only.

Configure firewall rules to restrict access to the API port (typically 443) to specific IPs.

Monitor API Activity

all

Enable logging and monitoring of API requests to detect suspicious modifications to user accounts.

Enable audit logging in vRealize Operations Manager and set up alerts for user modification events.

🧯 If You Can't Patch

  • Implement strict access controls to limit administrative API access to only necessary personnel.
  • Regularly audit user accounts and permissions for unauthorized changes.

🔍 How to Verify

Check if Vulnerable:

Check the vRealize Operations Manager version via the web interface or CLI; if it's 8.x and prior to 8.5, it is vulnerable.

Check Version:

ssh into the appliance and run 'cat /etc/vmware-release' or check via the web admin interface.

Verify Fix Applied:

After patching, verify the version is 8.5 or later and test API access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests modifying user accounts, especially from non-standard IPs or at odd hours.

Network Indicators:

  • Suspicious traffic to the administrative API port from unauthorized sources.

SIEM Query:

source="vrealize-ops" AND (event_type="user_modify" OR api_endpoint="/api/users/*") AND NOT user="admin"

🔗 References

📤 Share & Export