CVE-2021-21974
critical-risk
Published 2021-02-24
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
Do I need to act?
!
55.7% chance of exploitation in next 30 days
EPSS score — higher than 44% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
ADJACENT_NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (6)
Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2021-0002.html
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-21-250/
Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2021-0002.html
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-21-250/
78
/ 100
critical-risk
Severity
27/34 · High
Exploitability
18/34 · Moderate
Exposure
33/34 · Critical