Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21974

EPSS 55.04% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-21974

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
威睿 VMware ESXi 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vmware VMware ESXi是美国威睿(Vmware)公司的一套可直接安装在物理服务器上的服务器虚拟化平台。 ESXi 存在安全漏洞,该漏洞源于同一网段的恶意行为者可以访问端口427,导致远程代码执行。以下产品及版本受到影响:7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-VMware ESXi 7.0 before ESXi70U1c-17325551 -
-VMware Cloud Foundation 4.x before 4.2 and 3.x -

II. Public POCs for CVE-2021-21974

#POC DescriptionSource LinkShenlong Link
1POC for CVE-2021-21974 VMWare ESXi RCE Exploithttps://github.com/Shadow0ps/CVE-2021-21974POC Details
2Analysis of the ransom demands from Shodan resultshttps://github.com/n2x4/Feb2023-CVE-2021-21974-OSINTPOC Details
3ESXi EZ - A custom scanner that takes list of IPs either in JSON, CSV or individually and checks for infection CVE-2021-21974https://github.com/CYBERTHREATANALYSIS/ESXi_ransomware_scannerPOC Details
4Nmap NSE script for cve-2021-21974https://github.com/hateme021202/cve-2021-21974POC Details
5ESXi EZ - A custom scanner that takes list of IPs either in JSON, CSV or individually and checks for infection CVE-2021-21974https://github.com/CYBERTHREATANALYSIS/ESXi-Ransomware-Scanner-miPOC Details
6Nonehttps://github.com/mercylessghost/CVE-2021-21974POC Details
7CVE-2021-21974 Vulnerability Detection Tool Safe PoC that identifies vulnerable SLP implementations without exploitationhttps://github.com/abirasecurity/CVE-2021-21974_vuln_dectectionPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-21974

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-02-24 · 10 CVEs total

CVE-2020-11987Apache Batik 代码问题漏洞
CVE-2021-27645GNU C Library和glibc 资源管理错误漏洞
CVE-2020-12702eWeLink mobile application 加密问题漏洞
CVE-2021-3355LightCMS v跨站脚本漏洞
CVE-2020-28599Torsten Paul Openscad 缓冲区错误漏洞
CVE-2021-22667Advantech BB-ESWGP506-2SFP-T 信任管理问题漏洞
CVE-2021-21973VMware vCenter Server 代码问题漏洞
CVE-2021-21972VMware vSphere Client 路径遍历漏洞
CVE-2020-11988Apache XmlGraphics Commons 代码问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2021-21974

No comments yet


Leave a comment