VMware’s code-execution flaw has a severity rating of 9.8 out of 10

Graphic of an exclamation mark as a symbol of warning
Source: WhataWin | Getty Images

Researchers are sounding the alarm bells, noting that hackers are desperately scanning the internet for unpatched VMware servers that contain a dangerous code-execution vulnerability.

The vSphere Client (HTML5) contains a remote code execution vulnerability (CVE-2021-21972) in a vCenter Server plugin, meaning hackers with the right network access (to port 443, according to VMware) can execute commands with unrestricted privileges on the underlying operating system hosting the vCenter Server.

After issuing a patch this Feb. 23, VMware gave the vulnerability a score of 9.8, also known as a “Critical” rating, on its severity range.

The next day, cybersecurity researcher Troy Mursch of Bad Packets said hackers were actively searching for vulnerable servers.

“We’ve detected mass scanning activity targeting vulnerable VMware vCenter servers (https://vmware.com/security/advisories/VMSA-2021-0002.html),” Mursch tweeted Wednesday.


Bad Packets tweeted that there are nearly 15,000 vCenter servers exposed to the internet, some of which are based in Canada.


VMware says CVE-2021-21972 affects vCenter Server versions 6.5, 6.7, and 7.01. Anyone running one of these versions should update immediately to the latest patches. If that’s not possible, VMware has published these workarounds.

Would you recommend this article?



Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication. Click this link to send me a note →

Jim Love, Chief Content Officer, IT World Canada
Alex Coop
Alex Coophttp://www.itwc.ca
Editorial director for IT World Canada and its sister publications, and former community reporter. Also a great pick up basketball player | acoop@itwc.ca

Related Tech News