On the tail of VMware disclosing that its vCenter Server is affected by an arbitrary file upload vulnerability, a proof of concept for exploiting the flaw has been released.
A new Proof of Concept impacting VMware vCenter has been released by Rapid7 engineer William Vu. The PoC exploits CVE-2021-22005, a critical vulnerability announced by VMware last week. The researcher was able to create a reverse shell into the vCenter console and achieve arbitrary remote code execution (RCE).
CVE-2021-22005 allows for an arbitrary file upload using the CEIP (Analytics) service. This is enabled by default and VMware states that disabling the analytics service is not a sufficient mitigation strategy.
By uploading a specially crafted file, arbitrary code execution is possible. The attacker only needs to have network access to the device over port 443 to deliver the payload.
It is recommended that you review the advisory and FAQ from VMware on this vulnerability for more details.
vCenter Server 6.5, 6.7, and 7.0.
VMWare suggests upgrading VMWare vCenter to 7.0 Update 2c as soon as possible.
A workaround is documented if upgrading is not possible in a timely manner (KB85717 linked below).
Given the network based attack vector, this vulnerability highlights the importance of good network hygene, including network segmentation of management interfaces and disabling unused ports using firewalls and ACLs.
Security Advisory form VMware (VMSA-2021-0020):
Workaround Instructions from VMWare:
FAQ from VMWare regarding CVE-2021-22005 With Extensive Details: