CVE-2021-21985
CRITICAL KEV RANSOMWARE NUCLEIVmware Vcenter Server < 3.10.2.1 - SSRF
Title source: ruleDescription
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
Exploits (14)
nomisec
WORKING POC
31 stars
by testanull · poc
https://github.com/testanull/Project_CVE-2021-21985_PoC
gitlab
WORKING POC
by securitystuffbackup · poc
https://gitlab.com/securitystuffbackup/CVE-2021-21985_PoC
nomisec
WORKING POC
by aristosMiliaressis · poc
https://github.com/aristosMiliaressis/CVE-2021-21985
metasploit
WORKING POC
EXCELLENT
by Ricter Z, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/vmware_vcenter_vsan_health_rce.rb
Nuclei Templates (1)
VMware vSphere Client (HTML5) - Remote Code Execution
CRITICALby D0rkerDevil
References (4)
Scores
CVSS v3
9.8
EPSS
0.9441
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-06-04
InTheWild.io
2021-06-05
ENISA EUVD
EUVD-2021-9156
Ransomware Use
Confirmed
CWE
CWE-470
CWE-918
CWE-20
Status
published
Products (4)
vmware/cloud_foundation
3.0 - 3.10.2.1
vmware/vcenter_server
6.5 (23 CPE variants)
vmware/vcenter_server
6.7 (17 CPE variants)
vmware/vcenter_server
7.0 (9 CPE variants)
Published
May 26, 2021
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026