CVE-2021-22027

7.5 HIGH

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the vRealize Operations Manager API. Unauthenticated attackers with network access can exploit this to make the server send requests to internal systems, potentially exposing sensitive information. Organizations running vRealize Operations Manager 8.x prior to 8.5 are affected.

💻 Affected Systems

Products:
  • VMware vRealize Operations Manager
Versions: 8.x prior to 8.5
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the API endpoint specifically; requires network access to the vRealize Operations Manager instance.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to internal systems, extracts credentials, accesses cloud metadata services, or performs lateral movement within the network.

🟠

Likely Case

Information disclosure from internal services, potential access to cloud instance metadata, or reconnaissance of internal network resources.

🟢

If Mitigated

Limited to attempted SSRF with no successful data exfiltration due to network segmentation and proper access controls.

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows direct attack from internet if API is exposed.
🏢 Internal Only: HIGH - Even internally, unauthenticated access means any compromised internal host can exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited; unauthenticated nature makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vRealize Operations Manager 8.5 and later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0018.html

Restart Required: Yes

Instructions:

1. Download vRealize Operations Manager 8.5 or later from VMware portal. 2. Follow VMware's upgrade documentation for vRealize Operations Manager. 3. Apply the update through the management interface. 4. Restart services as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to vRealize Operations Manager API endpoints using firewalls or network ACLs.

API Access Control

all

Implement authentication requirements for API endpoints if possible through configuration changes.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vRealize Operations Manager from sensitive internal systems
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check vRealize Operations Manager version via web interface or SSH to appliance and run 'cat /etc/vmware-release'

Check Version:

ssh admin@<vrops-host> 'cat /etc/vmware-release'

Verify Fix Applied:

Confirm version is 8.5 or higher and test API endpoints for SSRF behavior using controlled testing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from vRealize Operations Manager to internal IPs
  • Multiple failed authentication attempts followed by API calls

Network Indicators:

  • HTTP requests from vRealize Operations Manager to unexpected internal endpoints
  • Traffic patterns suggesting SSRF exploitation

SIEM Query:

source="vrops-logs" AND (url="*api*" AND (dest_ip="10.*" OR dest_ip="192.168.*" OR dest_ip="172.16.*"))

🔗 References

📤 Share & Export