CVE-2021-22005

CRITICAL KEV RANSOMWARE NUCLEI

Vmware Cloud Foundation < 5.0 - Path Traversal

Title source: rule

Description

The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.

Exploits (16)

nomisec WORKING POC 195 stars
by shmilylty · remote
https://github.com/shmilylty/cve-2021-22005-exp
nomisec WORKING POC 37 stars
by rwincey · remote
https://github.com/rwincey/CVE-2021-22005
nomisec WORKING POC 22 stars
by TaroballzChen · remote
https://github.com/TaroballzChen/CVE-2021-22005-metasploit
nomisec WORKING POC 21 stars
by Jun-5heng · remote
https://github.com/Jun-5heng/CVE-2021-22005
nomisec SCANNER 13 stars
by 5gstudent · infoleak
https://github.com/5gstudent/CVE-2021-22005-
nomisec SCANNER 8 stars
by 1ZRR4H · poc
https://github.com/1ZRR4H/CVE-2021-22005
nomisec WORKING POC 2 stars
by tiagob0b · poc
https://github.com/tiagob0b/CVE-2021-22005
nomisec SCANNER 1 stars
by pisut4152 · poc
https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity
nomisec SUSPICIOUS 1 stars
by RedTeamExp · poc
https://github.com/RedTeamExp/CVE-2021-22005_PoC
nomisec SCANNER
by Jeromeyoung · poc
https://github.com/Jeromeyoung/VMWare-CVE-Check
nomisec WORKING POC
by InventorMAO · remote
https://github.com/InventorMAO/cve-2021-22005
vulncheck_xdb WORKING POC
remote
https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py
vulncheck_xdb WORKING POC
remote
https://github.com/CrackerCat/CVE-2021-22006
vulncheck_xdb WORKING POC
remote
https://github.com/Schira4396/VcenterKiller
metasploit WORKING POC EXCELLENT
by George Noseevich, Sergey Gerasimov, VMware, Derek Abdine, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/vmware_vcenter_analytics_file_upload.rb

Nuclei Templates (1)

VMware vCenter Server - Arbitrary File Upload
CRITICALby PR3R00T

Scores

CVSS v3 9.8
EPSS 0.9446
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2021-09-24
InTheWild.io 2021-09-24
ENISA EUVD EUVD-2021-9174
Ransomware Use Confirmed

Classification

CWE
CWE-22
Status published

Affected Products (4)

vmware/cloud_foundation < 5.0
vmware/vcenter_server
vmware/vcenter_server
vmware/vcenter_server

Timeline

Published Sep 23, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026