PatchSiren cyber security CVE debrief
CVE-2021-21975 VMware CVE debrief
CVE-2021-21975 is a VMware server-side request forgery (SSRF) issue affecting the vRealize Operations Manager API. CISA added it to the Known Exploited Vulnerabilities catalog on 2022-01-18 and marked it as having known ransomware campaign use. The listed required action is to apply updates per vendor instructions.
- Vendor
- VMware
- Product
- vRealize Operations Manager API
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-01-18
- Original CVE updated
- 2022-01-18
- Advisory published
- 2022-01-18
- Advisory updated
- 2022-01-18
Who should care
Organizations running VMware vRealize Operations Manager API should prioritize this issue, especially security, infrastructure, and operations teams responsible for patching internet-facing or broadly reachable management services. Because CISA lists it in KEV and notes ransomware campaign use, exposure should be treated as high priority.
Technical summary
The vulnerability is identified as a server-side request forgery in the vRealize Operations Manager API. SSRF flaws can allow an attacker to induce the server to make unintended network requests. Based on the supplied sources, the confirmed defensive takeaway is that this CVE is known exploited and should be remediated according to VMware’s update guidance.
Defensive priority
High. This CVE is on CISA’s Known Exploited Vulnerabilities catalog, and CISA notes known ransomware campaign use. The supplied source also gives a remediation due date of 2022-02-01, indicating urgent patching priority.
Recommended defensive actions
- Apply VMware updates per vendor instructions.
- Check whether any vRealize Operations Manager API instances are deployed and verify their patch status.
- Prioritize exposed, production, and management-plane deployments for remediation.
- Monitor for abnormal outbound or internal request patterns from the affected service where logging is available.
- Use the CISA KEV listing and NVD record as confirmation points during incident and patch tracking.
Evidence notes
Source corpus confirms the CVE title and description as a VMware SSRF in vRealize Operations Manager API. CISA KEV metadata supplied with the record states: vendorProject VMware, product vRealize Operations Manager API, dateAdded 2022-01-18, dueDate 2022-02-01, knownRansomwareCampaignUse Known, and requiredAction Apply updates per vendor instructions. Official reference links supplied include the CVE record, NVD detail page, CISA KEV catalog, and the source-item JSON feed.
Official resources
-
CVE-2021-21975 CVE record
CVE.org
-
CVE-2021-21975 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Publicly disclosed and added to CISA’s Known Exploited Vulnerabilities catalog on 2022-01-18, using the CVE published date supplied in the source corpus.