Hot on the heels of the recent April 2022 VMware critical security advisory VMSA-2022-0011, which addressed eight CVEs within VMware Workspace ONE Access and VMware Identity Manager, VMware has released a new creitical security advisory VMSA-2022-0014. This advisory addresses two new security vulnerabilities (CVE-2022-22972 and CVE-2022-22973) in VMware Workspace ONE Access and VMware Identity Manager, with one rated as critical.
According to VMware, a malicious user with network access to the VMware Workspace ONE Access or VMware Identity Manager user interfaces may be able to obtain administrative access without needing to authenticate. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Since this vulnerability may allow administrative access to users with only network access to the products, VMware states that “this critical vulnerability should be patched or mitigated immediately.”
VMware has listed the following product versions as affected by this vulnerability:
Additionally, VMware lists that the following product suites are affected as they include instances of VMware Identity Manager or VMware vRealize Automation:
According to VMware, a malicious user with local access to VMware Workspace ONE Access or VMware Identity Manager can escalate privileges to ‘root’. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.8.
VMware has listed the following product versions as affected by this vulnerability:
Additionally, VMware lists that the following product suites are affected as they include instances of VMware Identity Manager:
VMware has released patches and workarounds to address both vulnerabilities. The recommendation is to apply the patches to all vulnerable systems as soon as possible.
VMware KB88438 provides instructions on obtaining and deploying the patches related to this advisory for VMware Workspace ONE Access and VMware Identity Manager.
Resolving the vulnerability in VMware vRealize Automation 7.6 requires deploying the latest cumulative update, Patch 28. VMware KB70911 provides instructions on obtaining and deploying the latest cumulative update.
While workarounds are available, VMware states:
“The only way to remove the vulnerabilities from your environment is to apply the patches provided in VMSA-2021-0014. Workarounds, while convenient, do not remove the vulnerabilities, and may introduce additional complexities that patching would not.
While the decision to patch or use the workaround is yours, VMware always strongly recommends patching as the simplest and most reliable way to resolve this type of issue.”
The workarounds for each product are documented in the VMware KB88433.
Search
Get Notified of Future Posts
Recent Posts