CVE-2021-22025
📋 TL;DR
CVE-2021-22025 is a broken access control vulnerability in VMware vRealize Operations Manager API that allows unauthenticated attackers to add new nodes to existing vROps clusters. This affects vRealize Operations Manager 8.x versions prior to 8.5. Organizations running vulnerable versions with API network exposure are at risk.
💻 Affected Systems
- VMware vRealize Operations Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could compromise the entire vROps cluster by adding malicious nodes, potentially gaining control over monitoring infrastructure and using it as a foothold for lateral movement across the virtual environment.
Likely Case
Unauthenticated attackers with network access could disrupt cluster operations, add unauthorized nodes, and potentially gain access to sensitive monitoring data.
If Mitigated
With proper network segmentation and access controls, the impact is limited to authorized administrative networks only.
🎯 Exploit Status
The vulnerability requires network access to the API endpoint but no authentication, making exploitation straightforward for attackers who can reach the service.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: vRealize Operations Manager 8.5 or later
Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0018.html
Restart Required: Yes
Instructions:
1. Download vRealize Operations Manager 8.5 or later from VMware portal. 2. Follow VMware's upgrade documentation for vROps. 3. Apply the update to all nodes in the cluster. 4. Restart services as required by the upgrade process.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to vRealize Operations Manager API to only trusted administrative networks
Configure firewall rules to block unauthorized access to vROps API ports (typically 443/TCP)
🧯 If You Can't Patch
- Implement strict network access controls to limit API access to authorized administrative IPs only
- Monitor API access logs for unauthorized connection attempts and node addition requests
🔍 How to Verify
Check if Vulnerable:
Check vRealize Operations Manager version via the web interface (Admin → Support → System Information) or SSH to appliance and run 'cat /etc/vmware-release'
Check Version:
ssh admin@vrops-appliance 'cat /etc/vmware-release'
Verify Fix Applied:
Confirm version is 8.5 or later and test that unauthenticated API requests to add nodes are properly rejected
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated API requests to node management endpoints
- Unexpected node addition events in vROps logs
- Failed authentication attempts followed by successful node operations
Network Indicators:
- Unusual source IPs accessing vROps API endpoints
- Traffic patterns indicating node addition without prior authentication
SIEM Query:
source="vrops-logs" AND ("POST /api/nodes" OR "addNode") AND NOT user=*