This article provides information on how to mitigate the CVE-2021-21972, CVE-2021-21973 and CVE-2021-21974 vulnerabilities.
→ Applies to: VMware ESXi 6.5.x prior to ESXi650-202102101-SG
→ Applies to: VMware ESXi 6.7.x prior to ESXi670-202102401-SG
→ Applies to: VMware ESXi 7.x prior to ESXi70U1c-17325551
Vulnerability description
SOURCES
NIST (https://nvd.nist.gov/vuln/detail/CVE-2021-21972)
NIST (https://nvd.nist.gov/vuln/detail/CVE-2021-21973)
NIST (https://nvd.nist.gov/vuln/detail/CVE-2021-21974)
VMware (https://kb.vmware.com/s/article/76372)
Solution
Step 1. Connect to VMware ESXi CLI (via SSH)
Step 2. Disable access to OpenSLP (port 427)
esxcli network firewall ruleset set --ruleset-id CIMSLP --allowed-all false
esxcli network firewall ruleset allowedip add --ruleset-id CIMSLP --ip-address 172.16.254.2
Step 3. Disable access to CIMServer (port 5988/HTTP, port 5989/HTTPS)
esxcli network firewall ruleset set --ruleset-id CIMHttpServer --allowed-all false
esxcli network firewall ruleset allowedip add --ruleset-id CIMHttpServer --ip-address 172.16.254.2
It is recommended to upgrade your system to the latest versions of VMware ESXi.