The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-22117

CVE-2021-22117: RabbitMQ Server Privilege Escalation Flaw

CVE-2021-22117 is a privilege escalation vulnerability in RabbitMQ Server on Windows that allows attackers to add malicious plugins. This article covers the technical details, affected versions, security impact, and mitigation.

Published: February 25, 2026

CVE-2021-22117 Overview

RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins. This vulnerability represents a significant security risk for organizations running RabbitMQ on Windows systems, as it could enable local privilege escalation through malicious plugin injection.

Critical Impact

Local attackers with filesystem access can inject arbitrary plugins into RabbitMQ, potentially gaining code execution within the context of the RabbitMQ service and compromising message broker integrity.

Affected Products

  • Broadcom RabbitMQ Server (versions prior to 3.8.16)
  • Microsoft Windows (all supported versions running vulnerable RabbitMQ installations)

Discovery Timeline

  • 2021-05-18 - CVE CVE-2021-22117 published to NVD
  • 2025-04-02 - Last updated in NVD database

Technical Details for CVE-2021-22117

Vulnerability Analysis

This vulnerability stems from insecure permission configurations applied during the RabbitMQ installation process on Windows systems. The installer fails to properly restrict access to the plugin directory, leaving it accessible to local users who should not have modification rights. RabbitMQ's plugin architecture allows dynamically loaded plugins to execute code with the same privileges as the RabbitMQ service itself, making the plugin directory a critical security boundary.

When the installation completes, the plugin directory inherits overly permissive access controls that allow low-privileged local users to write files. An attacker who can place a malicious Erlang plugin in this directory can achieve code execution when RabbitMQ loads the plugin, either at service restart or through administrative plugin management operations.

This vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) and CWE-94 (Improper Control of Generation of Code), highlighting both the root cause (permission misconfiguration) and the potential impact (code injection).

Root Cause

The root cause of CVE-2021-22117 lies in the Windows installer's failure to apply restrictive Access Control Lists (ACLs) to the RabbitMQ plugin directory during installation. By default, the installer does not ensure that only administrative or service accounts have write access to the plugins directory. This oversight allows any authenticated local user with basic filesystem permissions to add, modify, or replace plugin files.

The issue specifically affects the directory structure created by the Windows installer, where proper permission hardening was not implemented as part of the installation routine.

Attack Vector

The attack vector for this vulnerability is local, requiring an attacker to have authenticated access to the Windows system where RabbitMQ is installed. The attack flow typically involves:

  1. An attacker gains local access to a Windows system running a vulnerable RabbitMQ version
  2. The attacker identifies the RabbitMQ plugin directory with insecure permissions
  3. A malicious Erlang plugin is crafted or obtained that contains arbitrary code
  4. The malicious plugin is placed in the plugin directory
  5. When the plugin is loaded (automatically or through administrator action), the attacker's code executes with RabbitMQ service privileges

The vulnerability does not require user interaction beyond the attacker's own actions on the local system, and exploitation complexity is low once local access is obtained.

Detection Methods for CVE-2021-22117

Indicators of Compromise

  • Unauthorized or unrecognized plugin files appearing in the RabbitMQ plugins directory
  • Unexpected file modification timestamps on existing plugins
  • RabbitMQ service loading plugins that are not part of the standard distribution
  • Unusual process activity spawned from the RabbitMQ service context

Detection Strategies

  • Monitor file system changes to the RabbitMQ plugin directory using endpoint detection tools
  • Audit ACLs on the RabbitMQ installation directories to identify overly permissive configurations
  • Implement file integrity monitoring (FIM) for critical RabbitMQ directories
  • Review Windows Security Event logs for unauthorized file write operations to protected directories

Monitoring Recommendations

  • Enable SentinelOne's file integrity monitoring capabilities to detect unauthorized changes to the plugin directory
  • Configure alerts for any new executable or plugin files created in RabbitMQ directories
  • Monitor RabbitMQ service for unexpected child processes or network connections
  • Regularly audit local user permissions and access patterns on systems running RabbitMQ

How to Mitigate CVE-2021-22117

Immediate Actions Required

  • Upgrade RabbitMQ to version 3.8.16 or later immediately on all Windows installations
  • Manually audit and correct plugin directory permissions on existing installations
  • Review all currently installed plugins for unauthorized or suspicious additions
  • Implement least-privilege access controls for accounts with local system access

Patch Information

Broadcom (formerly VMware) has addressed this vulnerability in RabbitMQ Server version 3.8.16 and later. The fix ensures that proper restrictive permissions are applied to the plugin directory during installation, preventing unauthorized users from adding or modifying plugins. Organizations should upgrade to the latest stable version of RabbitMQ to receive this fix along with other security improvements.

For detailed information, refer to the VMware CVE-2021-22117 Advisory.

Workarounds

  • Manually restrict plugin directory permissions using Windows ACLs to allow only administrators and the RabbitMQ service account
  • Implement application whitelisting to prevent execution of unauthorized plugins
  • Use file system auditing to log and alert on any changes to the plugin directory
  • Consider running RabbitMQ in a containerized environment where filesystem access is more strictly controlled
powershell
# Manually harden RabbitMQ plugin directory permissions
# Replace path with your actual RabbitMQ installation directory
$pluginPath = "C:\Program Files\RabbitMQ Server\rabbitmq_server-3.8.x\plugins"

# Remove inherited permissions and set restrictive ACLs
icacls $pluginPath /inheritance:r
icacls $pluginPath /grant "BUILTIN\Administrators:(OI)(CI)F"
icacls $pluginPath /grant "NT AUTHORITY\SYSTEM:(OI)(CI)F"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechRabbitmq Server

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94

  • CWE-732
  • Vendor Resources
  • VMware CVE-2021-22117 Advisory
  • Related CVEs
  • CVE-2020-5419: Broadcom RabbitMQ Server RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English