VMware’s code-execution flaw has a severity rating of 9.8 out of 10

Researchers are sounding the alarm bells, noting that hackers are desperately scanning the internet for unpatched VMware servers that contain a dangerous code-execution vulnerability.

The vSphere Client (HTML5) contains a remote code execution vulnerability (CVE-2021-21972) in a vCenter Server plugin, meaning hackers with the right network access (to port 443, according to VMware) can execute commands with unrestricted privileges on the underlying operating system hosting the vCenter Server.

After issuing a patch this Feb. 23, VMware gave the vulnerability a score of 9.8, also known as a “Critical” rating, on its severity range.

The next day, cybersecurity researcher Troy Mursch of Bad Packets said hackers were actively searching for vulnerable servers.

“We’ve detected mass scanning activity targeting vulnerable VMware vCenter servers (https://vmware.com/security/advisories/VMSA-2021-0002.html),” Mursch tweeted Wednesday.

 

Bad Packets tweeted that there are nearly 15,000 vCenter servers exposed to the internet, some of which are based in Canada.

 

VMware says CVE-2021-21972 affects vCenter Server versions 6.5, 6.7, and 7.01. Anyone running one of these versions should update immediately to the latest patches. If that’s not possible, VMware has published these workarounds.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Alex Coop
Alex Coophttp://www.itwc.ca
Former Editorial Director for IT World Canada and its sister publications.

Related Tech News

Featured Tech Jobs

 

CDN in your inbox

CDN delivers a critical analysis of the competitive landscape detailing both the challenges and opportunities facing solution providers. CDN's email newsletter details the most important news and commentary from the channel.