8.8
CVSSv3

CVE-2021-21974

Published: 24/02/2021 Updated: 02/06/2022
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of VMware ESXi. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SLP messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the SLP daemon.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware cloud foundation

vmware esxi 6.5

vmware esxi 6.7

vmware esxi 7.0.0

Mailing Lists

Proof of concept exploit for the OpenSLP heap overflow in VMware ESXi versions 70 before ESXi70U1c-17325551, 67 before ESXi670-202102401-SG, and 65 before ESXi650-202102101-SG ...

Github Repositories

CVE-2021-21974 POC for CVE2021-21974 VMWare ESXi RCE Exploit

ESXi_ransomware_scanner ESXi EZ - A custom scanner that takes list of IPs either in JSON, CSV or individually and checks for infection CVE-2021-21974

Feb2023-CVE-2021-21974-OSINT Analysis of the ransom demands from Shodan results I've provided a script that you can use as a basis for your own analysis, or to update and gather more results as Shodan scrapes them At the time of this publication, there were over 500 results Those results can be found in the provided CSV where the Ransom amount, Bitcoin wallet, and TOX ID

FrameVul FrameVul 综合 钉钉 泛微OA 致远OA Apache APISIX Apache Druid Apache Kylin Coremail Discuz Exchange FastJson Fckeditor Flask Gitlab Jboss Jenkins Log4j MeterSphere Oracle Access Manager Outlook Shiro Spring Struts2 Thinkphp TP-Link Vmware Weblogic Zabbix 综合 主流供应商的一些攻击性漏洞汇总 2021_Hvv漏洞 2022年Java应用程序的CVE漏洞

Project Description Collection of quality safety articles(To be rebuilt) Some are inconvenient to release Some forget update,can see me star collection-document awesome 以前的链接中大多不是优质的 渗透测试部分不再更新 因精力有限,缓慢更新 Author: [tom0li] Blog: tom0ligithubio Projec

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2021 CVE-2021-1056 (2021-01-07) NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidiako) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure pokerfaceSad/CVE-2021-1056 CVE-2021-

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

Recent Articles

VMWare Patches Critical RCE Flaw in vCenter Server
Threatpost • Elizabeth Montalbano • 24 Feb 2021

VMware has patched three vulnerabilities in its virtual-machine infrastructure for data centers, the most serious of which is a remote code execution (RCE) flaw in its vCenter Server management platform. The vulnerability could allow attackers to breach the external perimeter of an enterprise data center or leverage backdoors already installed on a system to find other vulnerable points of network entry to take over affected systems.
Positive Technologies researcher Mikhail Klyuchnikov dis...

VMware warns of critical remote code execution flaw in vSphere HTML5 client
The Register • Simon Sharwood, APAC Editor • 23 Feb 2021

If you don't patch, the hosts driving all your virty servers are at risk. So maybe your to-do list needs a tickle? Dying software forces changes to VMware’s vSphere Clients

VMware has revealed a critical-rated bug in the HTML5 client for its flagship vSphere hybrid cloud suite.
"The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin," says VMware's notification. "A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server."
As vCenter Server is the tool that drives a fleet of virtual ser...

Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescue
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Evil code hits more than 3,800 servers globally, according to the Feds

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a recovery script to help companies whose servers were scrambled in the recent ESXiArgs ransomware outbreak.
The malware attack hit thousands of servers over the globe but there's no need to enrich criminals any more. In addition to the script, CISA and the FBI today published ESXiArgs ransomware virtual machine recovery guidance on how to recover systems as soon as possible.
The software nasty is estimated t...

Ransomware scum launch wave of attacks on critical, but old, VMWare ESXi vuln
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources You’ve had almost two years to patch and some of the software is EOL, now attackers déployer un rançongiciel

France's Computer Emergency Response Team has issued a Bulletin D'Alerte regarding a campaign to infect VMware’s ESXI hypervisor with ransomware.
We get a little language lesson with this one: France's CERT describes this as an attempt to "déployer un rançongiciel," while Italy's Agenzia per la Cybersicurezza Nazionale – which has also warned of the campaign – warns that a "rilascio di ransomware" is under way.
Neither nation's infosec authorities offer any information about ...

ESXiArgs ransomware fights off Team America's data recovery script
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Want a clue to what you’re dealing with? Check the ransom note

That didn't take long.
A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes.
The variant can't be decrypted using the script released to GitHub by CISA because, unlike earlier v...

VMware fixes bug allowing attackers to steal admin credentials
BleepingComputer • Sergiu Gatlan • 01 Jan 1970

VMware has published security updates to address a high severity vulnerability in vRealize Operations that could allow attackers to steal admin credentials after exploiting vulnerable servers.
 is an AI-powered and "self-driving" IT operations management for private, hybrid, and multi-cloud environments, available as an on-premises or SaaS solution.
The vulnerability was discovered and reported to VMware by Positive Technologies web security researcher Egor Dimitrenko.
The ...

The Register

VMware has revealed a critical-rated bug in the HTML5 client for its flagship vSphere hybrid cloud suite.
“The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin,” says VMware’s notification. “A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.”
As vCenter Server is the tool that drives a fleet of v...