WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Action Recommended: VMware vCenter Server, Patch Accordingly
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Action Recommended: VMware vCenter Server, Patch Accordingly

Author: Jennifer Walker

Created: Friday, September 24, 2021 - 17:03

Categories: Cybersecurity, Security Preparedness

Attention: Members who use VMware vCenter Server within their environments are encouraged to review available advisories, address accordingly, and apply the necessary updates for impacted systems. Active scanning has been specifically observed for CVE-2021-22005. On September 21, 2021, CISA posted current activity report, VMware Releases Security Updates.

Exploitation of CVE-2021-22005 by an unauthenticated attacker could lead to remote code execution. This flaw impacts all vCenter Server 6.7 and 7.0 deployments with default configurations. VMware urges users not to ignore the advisory and warns that attackers who may have breached their systems could have access to vCenter servers from inside the corporate network. Researchers have observed active scanning and indicate this vulnerability is trivial to exploit. Access VMware for more on this and the other (18) flaws addressed/patched by the September 21, 2021 Security Advisory.

Additional Resources:

  • https://us-cert.cisa.gov/ncas/current-activity/2021/09/21/vmware-releases-security-updates
  • https://www.vmware.com/security/advisories/VMSA-2021-0020.html
  • https://www.securityweek.com/vmware-vcenter-servers-hacker-crosshairs-after-disclosure-new-flaw
  • https://www.helpnetsecurity.com/2021/09/22/cve-2021-22005/
  • https://www.bleepingcomputer.com/news/security/hackers-are-scanning-for-vmware-cve-2021-22005-targets-patch-now/

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar