CVE-2021-22017
Summary
| CVE | CVE-2021-22017 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-23 13:15:00 UTC |
| Updated | 2021-09-27 14:15:00 UTC |
| Description | Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed. |
Risk And Classification
EPSS: 0.794620000 probability, percentile 0.990750000 (date 2026-04-02)
CISA KEV: Listed on 2022-01-10; due 2022-01-24; ransomware use Unknown
Problem Types: NVD-CWE-noinfo
CISA Known Exploited Vulnerability
| Vendor | VMware |
|---|---|
| Product | vCenter Server |
| Name | VMware vCenter Server Improper Access Control |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2021-22017 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Vmware | Vcenter Server | 6.7 | - | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| VMSA-2021-0020 | MISC | www.vmware.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.