Advertisement Banner
  • Home
  • News
  • Cyber News
  • Contact
No Result
View All Result
  • Home
  • News
  • Cyber News
  • Contact
No Result
View All Result
Wellnessnewshubb
No Result
View All Result
Home Cyber News

VMware fixed critical authentication bypass vulnerabilitySecurity Affairs

admin by admin
August 5, 2022
in Cyber News


VMware patched a critical authentication bypass security flaw, tracked as CVE-2022-31656, impacting local domain users in multiple products.

VMware has addressed a critical authentication bypass security flaw, tracked as CVE-2022-31656, impacting local domain users in multiple products. An unauthenticated attacker can exploit the vulnerability to gain admin privileges.

“A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.” reads the advisory published by the virtualization giant.

The flaw impacts Workspace ONE Access, Identity Manager, and vRealize Automation products.

The flaw has been rated as critical and received a CVSS v3 base score of 9.8.

Organizations that cannot immediately address the flaw can use workarounds for this flaw which are detailed in the Knowledge Base articles.

The company acknowledged PetrusViet from VNG Security for reporting this flaw to them.

VMware also addressed these security flaws:

  • CVE-2022-31657 – URL Injection Vulnerability
  • CVE-2022-31658 – JDBC Injection Remote Code Execution Vulnerability
  • CVE-2022-31659 – SQL injection Remote Code Execution Vulnerability
  • CVE-2022-31660 – Local Privilege Escalation Vulnerability
  • CVE-2022-31661 – Local Privilege Escalation Vulnerability
  • CVE-2022-31662 – Path traversal vulnerability
  • CVE-2022-31663 – Cross-site scripting (XSS) vulnerability
  • CVE-2022-31664 – Local Privilege Escalation Vulnerability
  • CVE-2022-31665 – JDBC Injection Remote Code Execution Vulnerability

The above issues impact the following products:

  • VMware Workspace ONE Access (Access)
  • VMware Workspace ONE Access Connector (Access Connector)
  • VMware Identity Manager (vIDM)
  • VMware Identity Manager Connector (vIDM Connector)
  • VMware vRealize Automation (vRA)
  • VMware Cloud Foundation
  • vRealize Suite Lifecycle Manager

“These vulnerabilities are authentication bypass, remote code execution, and privilege escalation vulnerabilities.” reads a post published by the company. “An authentication bypass means that an attacker with network access to Workspace ONE Access, VMware Identity Manager, and vRealize Automation can obtain administrator access. Remote code execution (RCE) means that an attacker can trick the components into executing commands that aren’t authorized. Privilege escalation means that an attacker with local access can become root on the virtual appliance. It is extremely important that you quickly take steps to patch or mitigate these issues in on-premises deployments.”

Manager (vIDM), and vRealize Automation.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, virtualization)



Share On






Source link

Previous Post

China’s Live-Fire Drills Near Taiwan Send Ballistic Missiles Into Japan’s EEZ – The Diplomat

Next Post

Instagram expands NFT platform to 100 countries

Next Post

Instagram expands NFT platform to 100 countries

Recommended

Military Exercises in Uzbekistan and Tajikistan Illustrate Regional Cooperation and Concerns – The Diplomat

9 hours ago

NIST Launches New iEdison System for Reporting Federally Funded Inventions

16 hours ago

law enforcement white@8x

© 2022 Wellness News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Cyber News
  • Contact

Newsletter Sign Up.

No Result
View All Result
  • Home
  • News
  • Cyber News
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.