Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·11/3/2021

CVE-2021-21972 added to CISA KEV: VMware vCenter Server

Status: ✅ Confirmed exploited in the wild

Date added: 2021-11-03

Required action: Apply updates per vendor instructions.

Due date: 2021-11-17

Why this matters

VMware vCenter Server vSphere Client contains a remote code execution vulnerability in a vCenter Server plugin which allows an attacker with network access to port 443 to execute commands with unrestricted privileges on the underlying operating system.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.