Description Preview
Overview
The vulnerability (CVE-2021-21973) exists in the VMware vSphere Client's HTML5 interface, which fails to properly validate URLs in a vCenter Server plugin. This SSRF vulnerability allows attackers to send unauthorized requests from the affected server to other systems that might be inaccessible directly from the attacker's position. The vulnerability is particularly concerning because:
- It can be exploited remotely by unauthenticated attackers
- It only requires network access to port 443 (HTTPS)
- It affects multiple versions of critical VMware infrastructure products
- It can lead to information disclosure from internal systems
Affected products include:
- VMware vCenter Server 7.x before 7.0 U1c
- VMware vCenter Server 6.7 before 6.7 U3l
- VMware vCenter Server 6.5 before 6.5 U3n
- VMware Cloud Foundation 4.x before 4.2
- VMware Cloud Foundation 3.x before 3.10.1.2
Remediation
To address this vulnerability, VMware recommends the following actions:
-
Update to the latest patched versions of the affected products:
- vCenter Server 7.0: Upgrade to version 7.0 U1c or later
- vCenter Server 6.7: Upgrade to version 6.7 U3l or later
- vCenter Server 6.5: Upgrade to version 6.5 U3n or later
- VMware Cloud Foundation 4.x: Upgrade to version 4.2 or later
- VMware Cloud Foundation 3.x: Upgrade to version 3.10.1.2 or later
-
If immediate patching is not possible, consider implementing the following temporary mitigations:
- Restrict access to vCenter Server management interfaces (port 443) using network segmentation
- Implement strict firewall rules to limit which systems can connect to the vCenter Server
- Monitor for suspicious POST requests to the vCenter Server
-
After patching, conduct a thorough security review to determine if any unauthorized access occurred prior to remediation.
References
- VMware Security Advisory VMSA-2021-0002: https://www.vmware.com/security/advisories/VMSA-2021-0002.html
- Common Weakness Enumeration (CWE-918): Server Side Request Forgery (SSRF)
- NIST National Vulnerability Database: CVE-2021-21973
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Health Care & Social AssistanceHealth Care & Social Assistance
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Public AdministrationPublic Administration
- Retail TradeRetail Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade