CVE-2021-21972

CRITICAL KEV RANSOMWARE NUCLEI

Vmware Cloud Foundation < 3.10.1.2 - Path Traversal

Title source: rule

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).

Exploits (34)

nomisec WORKING POC 1,464 stars
by Schira4396 · remote
https://github.com/Schira4396/VcenterKiller
nomisec WORKING POC 500 stars
by NS-Sp4ce · remote
https://github.com/NS-Sp4ce/CVE-2021-21972
nomisec WORKING POC 270 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2021-21972
nomisec SCANNER 163 stars
by psc4re · poc
https://github.com/psc4re/NSE-scripts
nomisec SCANNER 137 stars
by QmF0c3UK · remote
https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC
nomisec SCANNER 54 stars
by alt3kx · infoleak
https://github.com/alt3kx/CVE-2021-21972
nomisec WORKING POC 33 stars
by milo2012 · remote
https://github.com/milo2012/CVE-2021-21972
nomisec SCANNER 28 stars
by conjojo · remote
https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972
nomisec SCANNER 28 stars
by GuayoyoCyber · infoleak
https://github.com/GuayoyoCyber/CVE-2021-21972
nomisec WORKING POC 20 stars
by TaroballzChen · remote
https://github.com/TaroballzChen/CVE-2021-21972
nomisec WORKING POC 13 stars
by Ma1Dong · remote
https://github.com/Ma1Dong/vcenter_rce
nomisec SCANNER 11 stars
by B1anda0 · infoleak
https://github.com/B1anda0/CVE-2021-21972
nomisec WRITEUP 10 stars
by orangmuda · remote
https://github.com/orangmuda/CVE-2021-21972
nomisec SCANNER 7 stars
by yaunsky · infoleak
https://github.com/yaunsky/CVE-2021-21972
nomisec WRITEUP 6 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2021-21972
nomisec SCANNER 3 stars
by ByZain · remote
https://github.com/ByZain/CVE-2021-21972
nomisec WORKING POC 3 stars
by haidv35 · poc
https://github.com/haidv35/CVE-2021-21972
nomisec WORKING POC 3 stars
by pettyhacks · remote
https://github.com/pettyhacks/vSphereyeeter
nomisec WORKING POC 2 stars
by renini · remote
https://github.com/renini/CVE-2021-21972
nomisec SCANNER 1 stars
by robwillisinfo · infoleak
https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972
nomisec SUSPICIOUS 1 stars
by Osyanina · poc
https://github.com/Osyanina/westone-CVE-2021-21972-scanner
nomisec WORKING POC 1 stars
by L-pin · remote
https://github.com/L-pin/CVE-2021-21972
nomisec SUSPICIOUS
by SimoesCTT · poc
https://github.com/SimoesCTT/CTT-enhanced-VMware-vCenter
gitlab SCANNER
by VoXaN24 · poc
https://gitlab.com/VoXaN24/CVE-2021-21972
gitlab SCANNER
by securitystuffbackup · poc
https://gitlab.com/securitystuffbackup/CVE-2021-21972
nomisec SCANNER
by JMousqueton · remote
https://github.com/JMousqueton/Detect-CVE-2021-21972
nomisec WORKING POC
by d3sh1n · remote
https://github.com/d3sh1n/cve-2021-21972
nomisec WORKING POC
by TAI-REx · poc
https://github.com/TAI-REx/CVE-2021-21972
nomisec WORKING POC
by user16-et · remote
https://github.com/user16-et/cve-2021-21972_PoC
exploitdb WORKING POC
by CHackA0101 · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50056
vulncheck_xdb STUB
remote
https://github.com/DougCarroll/CVE_2021_21972
exploitdb WORKING POC
by Photubias · pythonwebappsmultiple
https://www.exploit-db.com/exploits/49602
metasploit WORKING POC MANUAL
by Mikhail Klyuchnikov, wvu, mr_me, Viss · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vmware_vcenter_uploadova_rce.rb

Nuclei Templates (1)

VMware vSphere Client (HTML5) - Remote Code Execution
CRITICALby dwisiswant0

Scores

CVSS v3 9.8
EPSS 0.9382
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2021-02-25
InTheWild.io 2021-02-25
ENISA EUVD EUVD-2021-9143
Ransomware Use Confirmed

Classification

CWE
CWE-22
Status published

Affected Products (42)

vmware/cloud_foundation < 3.10.1.2
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server
... and 27 more

Timeline

Published Feb 24, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026