CVE-2021-22025

7.5 HIGH

📋 TL;DR

CVE-2021-22025 is a broken access control vulnerability in VMware vRealize Operations Manager API that allows unauthenticated attackers to add new nodes to existing vROps clusters. This affects vRealize Operations Manager 8.x versions prior to 8.5. Organizations running vulnerable versions with API network exposure are at risk.

💻 Affected Systems

Products:
  • VMware vRealize Operations Manager
Versions: 8.x prior to 8.5
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default. The API is typically accessible on the management network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could compromise the entire vROps cluster by adding malicious nodes, potentially gaining control over monitoring infrastructure and using it as a foothold for lateral movement across the virtual environment.

🟠

Likely Case

Unauthenticated attackers with network access could disrupt cluster operations, add unauthorized nodes, and potentially gain access to sensitive monitoring data.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to authorized administrative networks only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to the API endpoint but no authentication, making exploitation straightforward for attackers who can reach the service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vRealize Operations Manager 8.5 or later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0018.html

Restart Required: Yes

Instructions:

1. Download vRealize Operations Manager 8.5 or later from VMware portal. 2. Follow VMware's upgrade documentation for vROps. 3. Apply the update to all nodes in the cluster. 4. Restart services as required by the upgrade process.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to vRealize Operations Manager API to only trusted administrative networks

Configure firewall rules to block unauthorized access to vROps API ports (typically 443/TCP)

🧯 If You Can't Patch

  • Implement strict network access controls to limit API access to authorized administrative IPs only
  • Monitor API access logs for unauthorized connection attempts and node addition requests

🔍 How to Verify

Check if Vulnerable:

Check vRealize Operations Manager version via the web interface (Admin → Support → System Information) or SSH to appliance and run 'cat /etc/vmware-release'

Check Version:

ssh admin@vrops-appliance 'cat /etc/vmware-release'

Verify Fix Applied:

Confirm version is 8.5 or later and test that unauthenticated API requests to add nodes are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to node management endpoints
  • Unexpected node addition events in vROps logs
  • Failed authentication attempts followed by successful node operations

Network Indicators:

  • Unusual source IPs accessing vROps API endpoints
  • Traffic patterns indicating node addition without prior authentication

SIEM Query:

source="vrops-logs" AND ("POST /api/nodes" OR "addNode") AND NOT user=*

🔗 References

📤 Share & Export