On Tuesday the 23th of February VMWare published a patch to resolve multiple critical vulnerabilities. These vulnerabilities affect products of VMWare products ESXi, vCenter Server, en Cloud Foundation. These vulnerabilities are listed under CVE-2021-21972, CVE-2021-21974, and CVE-2021-21973.
The vulnerabilities CVE-2021-21972 and CVE-2021-21973 enable an attacker who has access to port 443 to execute commands with unrestricted privileges. Vulnerability CVE-2021-21974 applies to ESXi and Cloud foundation and makes it possible for an attacker with access to port 427 to exploit a memory vulnerability, after which remote code can be executed. The impact of these vulnerabilities is estimated as high.
There is a publicly available Proof of Concept for CVE-2021-21972 en CVE-2021-21973. Therefore the risk of an attacker exploiting this vulnerability is high. For CVE-2021-21974 there is no Proof of Concept available yet, Northwave estimates the risk for this vulnerability is as medium.
VMware provided patches to resolve the listed vulnerabilities. Northwave advices to apply these patches immediately on ESXi, vCenter Server, en Cloud Foundation instances. At this time there are no other known mitigation techniques.