7.2
CVSSv2

CVE-2021-22015

Published: 23/09/2021 Updated: 03/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of VMware vCenter Server Appliance. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the permissions of root-owned service files. The product sets incorrect permissions on sensitive files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware vcenter server 6.5

vmware vcenter server 6.7

vmware vcenter server 7.0

vmware cloud foundation

Exploits

This Metasploit module exploits a privilege escalation in vSphere/vCenter due to improper permissions on the /usr/lib/vmware-vmon/java-wrapper-vmon file It is possible for anyone in the cis group to write to the file, which will execute as root on vmware-vmon service restart or host reboot This module was successfully tested against VMware Virtua ...

Github Repositories

Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter

vScalation (CVE-2021-22015) Local Privilege Escalation in VMWare vCenter Pentera’s research group discovered a vulnerability in VMWare’s vCenter Server program affecting VMWare’s software installed in 500,000 organizations worldwide responsible to manage their most critical systems Our findings were proactively reported to VMWare and were released under CVE-2

Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter

vScalation (CVE-2021-22015) Local Privilege Escalation in VMWare vCenter Pentera’s research group discovered a vulnerability in VMWare’s vCenter Server program affecting VMWare’s software installed in 500,000 organizations worldwide responsible to manage their most critical systems Our findings were proactively reported to VMWare and were released under CVE-2

Recent Articles

Break out your emergency change process and patch this ransomware-friendly bug ASAP, says VMware
The Register • Simon Sharwood, APAC Editor • 22 Sep 2021

Get our weekly newsletter File upload vuln lets miscreants hijack vCenter Server - and is being exploited in the wild

Update VMware has disclosed a critical bug in its flagship vSphere and vCenter products and urged users to drop everything and patch it. The virtualization giant also offered a workaround. The bug is one of 19 disclosed today by VMware. The worst of the bunch is CVE-2021-22005, described as "an arbitrary file upload vulnerability in the Analytics service" that's part of vCenter Server. The flaw is rated 9.8/10 in severity using the Common Vulnerability Scoring System. "A malicious actor with net...