By security practitioners, for security practitioners innovate | novacoast federal | novaSOC | novacoast
By security practitioners, for security practitioners

PoC Released For New VMware vCenter Vulnerability

On the tail of VMware disclosing that its vCenter Server is affected by an arbitrary file upload vulnerability, a proof of concept for exploiting the flaw has been released.


A new Proof of Concept impacting VMware vCenter has been released by Rapid7 engineer William Vu. The PoC exploits CVE-2021-22005, a critical vulnerability announced by VMware last week. The researcher was able to create a reverse shell into the vCenter console and achieve arbitrary remote code execution (RCE).

Vulnerability Details

CVE-2021-22005 allows for an arbitrary file upload using the CEIP (Analytics) service. This is enabled by default and VMware states that disabling the analytics service is not a sufficient mitigation strategy.

By uploading a specially crafted file, arbitrary code execution is possible. The attacker only needs to have network access to the device over port 443 to deliver the payload.

It is recommended that you review the advisory and FAQ from VMware on this vulnerability for more details.

Affected versions

vCenter Server 6.5, 6.7, and 7.0.


VMWare suggests upgrading VMWare vCenter to 7.0 Update 2c as soon as possible.
A workaround is documented if upgrading is not possible in a timely manner (KB85717 linked below).
Given the network based attack vector, this vulnerability highlights the importance of good network hygene, including network segmentation of management interfaces and disabling unused ports using firewalls and ACLs.


Security Advisory form VMware (VMSA-2021-0020):

Workaround Instructions from VMWare:

FAQ from VMWare regarding CVE-2021-22005 With Extensive Details:

CISA Advisory:

Mitre Entry:

Previous Post

Netgear Warns Certain Routers Impacted by Remote Code Execution Vulnerability

Next Post

Hikvision Cameras RCE Vulnerability Requires a Firmware Update

Innovate uses cookies to give you the best online experience. If you continue to use this site, you agree to the use of cookies. Please see our privacy policy for details.