Kwetsbaarheid

VMware Workspace ONE Access vulnerabilities

This live blog contains information regarding vulnerabilities in VMware Workspace ONE Access. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on April 13, 2022.

Clip path group@2x

T-Update

Informatie over kwetsbaarheden

This live blog contains information regarding vulnerabilities in VMware Workspace ONE Access. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on April 13, 2022.

Update April 13, 2022

14:00 | Recently, VMware has published Security Advisory VMSA-2022-0011 related to eight different CVEs in VMware Workspace ONE Access. Three of these CVE’s have a score of 9.8 and are the subject of this writing: one Remote Code Execution and two Authentication Bypass vulnerabilities.

The Remote Code Execution vulnerability also exists in the following related VMware products:  VMware Identity Manager, VMware Cloud Foundation and vRealize Suite Lifecycle Manager.

VMware has published patches. It is advised to apply these security patches as soon as possible.

Cyberveiligheid op maat

Achtergrond

Risico

For CVE-2022-22954, an attacker with network access to the solution, can trigger a server-side template injection that may result in a remote code execution. A Proof-of-concept exploit is available for this vulnerability.

CVE-2022-22955 and CVE-2022-22956 may allow an attacker to bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.

Advies

Recently, VMware has published Security Advisory VMSA-2022-0011 related to eight different CVEs in VMware Workspace ONE Access. Three of these CVE’s have a score of 9.8 and are the subject of this writing:

  • CVE-2022-22954 – Remote code execution
  • CVE-2022-22955 – Authentication bypass
  • CVE-2022-22956 – Authentication bypass

Vulnerability CVE-2022-22954 also exists in the following related VMware products:

  • VMware Identity Manager
  • VMware Cloud Foundation
  • vRealize Suite Lifecycle Manager

The CVSS scale runs from 0 to 10. A score of 9.8 or higher is rare and implies a high risk of exploitation with high impact. On the 12th of April 2022, a proof-of-concept exploit was published for CVE-2022-22954.

The following versions of VMware Workspace ONE Access Appliance are vulnerable to all three vulnerabilities:

  • 20.10.0.0
  • 20.10.0.1
  • 21.08.0.0
  • 21.08.0.1

Additionally, the following related VMware products are affected by CVE-2022-22954:

  • Identity Manager versions – 3.3.3 to 3.3.6
  • VMware Cloud Foundation versions – 4.x
  • vRealize Suite Lifecycle Manager versions – 8.x

VMware has published updates solving the vulnerabilities. It is strongly advised to upgrade as soon as possible. For more information and the download locations of the patches, please refer to the VMware Security Advisory

Bronnen

More information:

Ellipse 6

Schrijf je in voor T-Updates

Ontvang elke woensdag het laatste nieuws over malware of kwetsbaarheden in je mail

More than 1,000 organizations have already joined us.

Tesorion uses your data to send the requested information. In addition, your data may be used for commercial follow-up. You can unsubscribe from this at any time via the link in the email. For more information, read our privacy policy.

Opt-in-EN
Ellipse 6