QID 216263

Date Published: 2021-09-20

QID 216263: VMware ESXi 7.0 Patch Release ESXi70U2-17630552 Missing (VMSA-2021-0014)

VMware ESXi is an enterprise level computer virtualization product.

SFCB (Small Footprint CIM Broker) as used in ESXi has an authentication bypass vulnerability.

Affected Versions:
VMware ESXi 7.0 prior to build 17630552

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable versions of VMware ESXi with build version using web service present on target.

QID Detection Logic (Authenticated):
This QID checks whether the SFCB service (CIM Server) service and SLP service are off as mentioned in the workaround. If both services are off, QID will not flag.

A malicious actor with network access to port 5989 on ESXi may exploit this issue to bypass SFCB authentication by sending a specially crafted request.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Vmware has released patch for VMware ESXi 7.0 , visit VMware ESXi 7.0, Patch Release ESXi70U2-17630552
    Refer to VMware advisory VMSA-2021-0014 for more information.

    Workaround:
    For CVE-2021-21994
    Disable the SFCB service (CIM Server) on the ESX/ESXi host
    Please visit here for more information.

    For CVE-2021-21995
    Disable the SLP service on the ESX/ESXi host
    Please visit here for more information.

    CVEs related to QID 216263

    Software Advisories
    Advisory ID Software Component Link
    VMware ESXi 7.0 ESXi70U2-17630552 URL Logo docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-esxi-702-release-notes.html