CYBER MONGOL
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
Search by typing & pressing enter

YOUR CART

2/24/2021 0 Comments

vCenter RCE

Picture
​*WARNING: Extremely Heavy Human Momentum behind Multiple RCE’s Targeting vCenter (CVE-2021-21972)* Sensors are seeing convergence between CVE-2021-21972 exploit signals and pillar signals (signals that consistently show strong human momentum), indicating massive human interest in these publicly available exploits.  
 
“A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.”
 
Exploit 1: QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC (github.com)
 
Exploit 2: NS-Sp4ce/CVE-2021-21972: CVE-2021-21972 (github.com)
 
#cyberthreatintelligence #infosec #cybersecurity #informationsecurity #threatintelligence #networksecurity #sec #security #tools #offensivesecurity #pentesting #redteam #blueteam 
0 Comments



Leave a Reply.

    Archives

    July 2021
    June 2021
    May 2021
    March 2021
    February 2021
    January 2021

    RSS Feed

contact us:
© COPYRIGHT 2015. ALL RIGHTS RESERVED.