type: trigger format: 2.0 name: crowdsecurity/vmware-vcenter-vmsa-2021-0027 description: "Detect VMSA-2021-0027 exploitation attemps" filter: | evt.Meta.log_type in ['http_access-log', 'http_error-log'] && evt.Meta.http_path matches '/ui/vcav-bootstrap/rest/vcav-providers/provider-logo\\?url=(file|http)' groupby: "evt.Meta.source_ip" blackhole: 2m labels: confidence: 3 spoofable: 0 classification: - attack.T1190 - attack.T1595 - cve.CVE-2021-0027 behavior: "vm-management:exploit" label: "VMWARE VCenter VMSA CVE-2021-0027" remediation: true service: vmware