URI Normalization Vulnerability in vCenter Server by VMware
CVE-2021-22017
Key Information:
- Vendor
- Vmware
- Vendor
- CVE Published:
- 23 September 2021
Badges
Summary
A vulnerability exists within the Rhttproxy component of VMware's vCenter Server that arises from improper URI normalization. This flaw can be exploited by a malicious actor who has network access to port 443 on the vCenter Server. The attacker may leverage this vulnerability to bypass the proxy, consequently gaining unauthorized access to internal endpoints, which could lead to further exploitation or data leaks.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply updates per vendor instructions.
Affected Version(s)
VMware vCenter Server, VMware Cloud Foundation VMware vCenter Server(6.7 before 6.7 U3o and 6.5 before 6.5 U3q) and VMware Cloud Foundation 3.x before 3.10.2.2
References
EPSS Score
6% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved