CVE-2021-21985

CRITICAL KEV RANSOMWARE NUCLEI

Vmware Vcenter Server < 3.10.2.1 - SSRF

Title source: rule

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

Exploits (14)

nomisec WORKING POC 215 stars
by alt3kx · remote
https://github.com/alt3kx/CVE-2021-21985_PoC
nomisec WORKING POC 115 stars
by xnianq · remote
https://github.com/xnianq/cve-2021-21985_exp
nomisec WORKING POC 31 stars
by testanull · poc
https://github.com/testanull/Project_CVE-2021-21985_PoC
nomisec WORKING POC 3 stars
by sknux · poc
https://github.com/sknux/CVE-2021-21985_PoC
nomisec WORKING POC 2 stars
by daedalus · remote
https://github.com/daedalus/CVE-2021-21985
nomisec SCANNER 2 stars
by onSec-fr · infoleak
https://github.com/onSec-fr/CVE-2021-21985-Checker
nomisec WORKING POC 1 stars
by haidv35 · poc
https://github.com/haidv35/CVE-2021-21985
nomisec WRITEUP 1 stars
by bigbroke · poc
https://github.com/bigbroke/CVE-2021-21985
gitlab WORKING POC
by bybsecs · remote
https://gitlab.com/bybsecs/CVE-2021-21985
gitlab WORKING POC
by securitystuffbackup · poc
https://gitlab.com/securitystuffbackup/CVE-2021-21985_PoC
nomisec WORKING POC
by aristosMiliaressis · poc
https://github.com/aristosMiliaressis/CVE-2021-21985
nomisec SCANNER
by mauricelambert · infoleak
https://github.com/mauricelambert/CVE-2021-21985
vulncheck_xdb WORKING POC
remote
https://github.com/Schira4396/VcenterKiller
metasploit WORKING POC EXCELLENT
by Ricter Z, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/vmware_vcenter_vsan_health_rce.rb

Nuclei Templates (1)

VMware vSphere Client (HTML5) - Remote Code Execution
CRITICALby D0rkerDevil

Scores

CVSS v3 9.8
EPSS 0.9441
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-06-04
InTheWild.io 2021-06-05
ENISA EUVD EUVD-2021-9156
Ransomware Use Confirmed
CWE
CWE-470 CWE-918 CWE-20
Status published
Products (4)
vmware/cloud_foundation 3.0 - 3.10.2.1
vmware/vcenter_server 6.5 (23 CPE variants)
vmware/vcenter_server 6.7 (17 CPE variants)
vmware/vcenter_server 7.0 (9 CPE variants)
Published May 26, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026