Mitigation Instructions for CVE-2016-4437
Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ
1 min read
CyRisk Vulnerability Management Team : Feb 23, 2024 4:42:21 PM
SUBJECT: Critical VMware vCenter Server RCE Vulnerability: Patch Immediately (CVE-2021-21985)
TECH STACK: VMware vCenter Server 6.5, 6.7, and 7.0 (specific versions listed in references)
DATE(S) ISSUED: 05/26/2021
NVD Last Modified: 09/14/2021
CRITICALITY: (CVSS v3 Score: 9.8)
OVERVIEW:
This vulnerability (CVE-2021-21985) affects VMware vCenter Server versions 6.5, 6.7, and 7.0 due to lack of input validation in the Virtual SAN Health Check plug-in. A remote attacker with network access to port 443 can exploit this vulnerability to execute arbitrary code with unrestricted privileges on the underlying operating system hosting vCenter Server. This gives attackers complete control over the affected system, podendo lead to data theft, malware installation, and disruption of services.
SOLUTION/MITIGATION:
The primary mitigation for this vulnerability is to update vCenter Server to the latest patched version immediately. VMware has released patches for all affected versions:
Additional mitigation steps:
Confirmation & Additional Information:
REFERENCES:
Third Party Advisories:
Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ
Mitigating CVE-2013-1896: Privilege Escalation Vulnerability in Puppet
Subject: Mitigating CVE-2014-6271: Shellshock Vulnerability in Bash