8.8
CVSSv3

CVE-2021-21974

Published: 24/02/2021 Updated: 02/06/2022
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 518
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of VMware ESXi. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SLP messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the SLP daemon.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware cloud foundation

vmware esxi 6.5

vmware esxi 6.7

vmware esxi 7.0.0

Exploits

Proof of concept exploit for the OpenSLP heap overflow in VMware ESXi versions 70 before ESXi70U1c-17325551, 67 before ESXi670-202102401-SG, and 65 before ESXi650-202102101-SG ...

Github Repositories

Python / scapy module implementing SRVLOC/SLP protocol and scans for enabled OpenSLP services.

Scanner for SLP services (CVE-2019-5544 CVE-2020-3992) Python script that implements SRVLOC/SLP protocol to scan for enabled OpenSLP services You may find it handy while searching for systems impacted by CVE-2019-5544, CVE-2020-3992 or CVE-2021-21974 More info on the VMware vulnerability you may find for instance here: blograpid7com/2020/11/11/vmware-esxi-openslp

POC for CVE-2021-21974 VMWare ESXi RCE Exploit

CVE-2021-21974 POC for CVE2021-21974 VMWare ESXi RCE Exploit

POC for CVE-2021-21974 VMWare ESXi RCE Exploit

CVE-2021-21974 POC for CVE2021-21974 VMWare ESXi RCE Exploit

Analysis of the ransom demands from Shodan results

Feb2023-CVE-2021-21974-OSINT Analysis of the ransom demands from Shodan results and Censys For Shodan: I've provided a script that you can use as a basis for your own analysis, or to update and gather more results as Shodan scrapes them I've also included a python script that can be used to query the blockstreaminfo API for any wallet addresses with associated trans

Red-Team-tools-and-usefull-links Other complations githubcom/CyberSecurityUP/Awesome-Red-Team-Operations githubcom/CaledoniaProject/awesome-opensource-security githubcom/swisskyrepo/PayloadsAllTheThings githubcom/bigb0sss/RedTeam-OffensiveSecurity githubcom/chosenonehacks/awesome-pentest-cheat-sheets AI githubcom/greshake/ll

Recent Articles

VMware warns of critical remote code execution flaw in vSphere HTML5 client
The Register • Simon Sharwood, APAC Editor • 23 Feb 2021

If you don't patch, the hosts driving all your virty servers are at risk. So maybe your to-do list needs a tickle? Dying software forces changes to VMware’s vSphere Clients

VMware has revealed a critical-rated bug in the HTML5 client for its flagship vSphere hybrid cloud suite. "The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin," says VMware's notification. "A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server." As vCenter Server is the tool that drives a fleet of virtual servers, this C...

Ransomware scum launch wave of attacks on critical, but old, VMWare ESXi vuln
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources You’ve had almost two years to patch and some of the software is EOL, now attackers déployer un rançongiciel

France's Computer Emergency Response Team has issued a Bulletin D'Alerte regarding a campaign to infect VMware’s ESXI hypervisor with ransomware. We get a little language lesson with this one: France's CERT describes this as an attempt to "déployer un rançongiciel," while Italy's Agenzia per la Cybersicurezza Nazionale – which has also warned of the campaign – warns that a "rilascio di ransomware" is under way. Neither nation's infosec authorities offer any information about the source o...

ESXiArgs ransomware fights off Team America's data recovery script
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Want a clue to what you’re dealing with? Check the ransom note

That didn't take long. A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes. The variant can't be decrypted using the script released to GitHub by CISA because, unlike earlier versions, it ...

Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescue
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Evil code hits more than 3,800 servers globally, according to the Feds

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a recovery script to help companies whose servers were scrambled in the recent ESXiArgs ransomware outbreak. The malware attack hit thousands of servers over the globe but there's no need to enrich criminals any more. In addition to the script, CISA and the FBI today published ESXiArgs ransomware virtual machine recovery guidance on how to recover systems as soon as possible. The software nasty is estimated to be on more...