CrowdSec
5/10CrowdSec Score

Vmware - Information Disclosure (CVE-2021-0027)

Published on24-11-2021
First seen on19-12-2025
Public ExploitCVSS -1/10Vmware - vCenter Server

1873Exploiting IPs reported

The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

CrowdSec analysis

CVE-2021-0027 is an Information Disclosure vulnerability affecting Vmware vCenter Server. Unauthenticated attackers can exploit this vulnerability to read arbitrary files on the vCenter Server.

CrowdSec has been tracking this vulnerability and its exploits since 9th of December 2021.

CrowdSec network data shows that most actors exploiting CVE-2021-0027 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. CrowdSec data also reveals a clear uptick in attacks involving CVE-2021-0027 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

There are no public exploits for this vulnerability. However, it is usually abused by sending crafted requests to the vCenter Server.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.