CVE-2021-22050
📋 TL;DR
CVE-2021-22050 is a slow HTTP POST denial-of-service vulnerability in VMware ESXi's rhttpproxy service. Attackers with network access can overwhelm the service with multiple slow requests, causing denial-of-service. This affects ESXi systems with rhttpproxy exposed to untrusted networks.
💻 Affected Systems
- VMware ESXi
📦 What is this software?
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
⚠️ Risk & Real-World Impact
Worst Case
Complete unavailability of ESXi management interface and potential disruption of virtual machine operations if rhttpproxy crashes or becomes unresponsive.
Likely Case
Degraded or unavailable ESXi management interface, preventing administrators from managing the hypervisor while VMs continue running.
If Mitigated
Minimal impact if network segmentation isolates ESXi management interfaces from untrusted networks and proper monitoring is in place.
🎯 Exploit Status
Exploitation requires only network access to the rhttpproxy service (typically port 443). No authentication required. Simple tools can generate slow HTTP POST requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ESXi 6.5 EP30, ESXi 6.7 EP27, ESXi 7.0 U3c
Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2022-0004.html
Restart Required: Yes
Instructions:
1. Download appropriate ESXi patch from VMware portal. 2. Place host in maintenance mode. 3. Apply patch via esxcli software vib update. 4. Reboot host. 5. Verify patch installation.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to ESXi management interfaces to trusted administrative networks only.
Configure firewall rules to allow only specific source IPs to access ESXi management ports (typically 443, 902)
Load Balancer Protection
allConfigure load balancers or WAFs to detect and block slow HTTP attacks.
Configure connection timeouts and request size limits on network devices
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ESXi management interfaces
- Deploy network monitoring to detect slow HTTP attack patterns
🔍 How to Verify
Check if Vulnerable:
Check ESXi version: esxcli system version get. If version is earlier than patched versions listed above, system is vulnerable.
Check Version:
esxcli system version get
Verify Fix Applied:
Verify patch installation: esxcli software vib list | grep -i rhttpproxy. Check version matches patched release.
📡 Detection & Monitoring
Log Indicators:
- Multiple slow HTTP POST requests to /ui or other rhttpproxy endpoints in ESXi logs
- Increased rhttpproxy service errors or crashes
Network Indicators:
- Unusually slow HTTP POST requests to ESXi management IP on port 443
- Multiple incomplete HTTP requests from single sources
SIEM Query:
source="esxi" AND ("rhttpproxy" OR "/ui") AND ("POST" OR "slow") AND status=408 OR status=500