Just a reminder that these severity ratings, while often directionally useful (a 9.x probably is something you should care about if you run the target software; a 2.x is <i>probably</i> not), the ratings themselves are total horseshit and are running industry joke; literally a Ouija board, starting from a hopelessly ambiguous "calculator" that you run and then apply subtle inputs to to get the score where you want it to be.
A poc appears to be available there : <a href="https://github.com/xnianq/cve-2021-21985_exp" rel="nofollow">https://github.com/xnianq/cve-2021-21985_exp</a> !<p>P.s. I use yandex to find CVE POC, google is almost useless for that kind of search and yandex almost always deliver working code !
It's safe to say that anybody who exposes VCenter directly to the web is practicing poor security. I cannot imagine any scenario where this would be required. I manage a few VxRail/vSphere clusters and everything is behind firewalls and VPNs.<p>That said, I understand that this vulnerability basically gives root to anyone with VPN access. In our case, pretty much anyone who has VPN access to the cluster already has root on it anyway.
If you don't use the vCenter plugins in which the vulnerabilities exist (vSAN Health Check, vROPS Manager), it's incredibly easy to mitigate this vulnerability by manually marking these plugins as incompatible: <a href="https://kb.vmware.com/s/article/83829" rel="nofollow">https://kb.vmware.com/s/article/83829</a>
Not even the first preauth VSphere RCE this year: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21972" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2197...</a>
Dear arstechnica, please don't write articles like this, where you make it seem like curl is somehow related or even the cause:
"It can be reproduced using five requests from cURL, a command-line tool that transfers data using HTTP, HTTPS, IMAP, and other common Internet protocols."
I find it quite untasteful to somehow sneak an plug for curl in here at all.<p>Thinking of: “I will slaughter you”, where Daniel explains how he gets death threats from clueless sysadmins that see that they have been hacked by someone that used curl.<p><a href="https://daniel.haxx.se/blog/2021/02/19/i-will-slaughter-you/" rel="nofollow">https://daniel.haxx.se/blog/2021/02/19/i-will-slaughter-you/</a><p>Edit: I have e-mailed the author, but someone that use Twitter may want to try and reach the author on @dangoodin001. Thank you.
I worked briefly at VMware. An exploit like this doesn't surprise me one bit.<p>We had a company mailing list that people used to email jokes back and forth all the time.<p>One rather ignorant programmer put a rule on his email where he would get an alert whenever anybody emailed him with a particular word in the subject line. That word happened to get into a rather popular email thread, and in the middle of the thread we started getting complaints from him asking us to change the subject line because his pager was beeping off the hook.<p>Career limiting move! He took a lot of heat for making poor assumptions.