VMware fixed critical vulnerabilities in multiple products that could be exploited by remote attackers to execute arbitrary code.
VMware has addressed critical remote code vulnerabilities in multiple products, including VMware’s Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products.
The virtualization giant urges its customers to address the critical vulnerability immediately to prevent its exploitation.
“This critical vulnerability should be patched or mitigated immediately per the instructions in VMSA-2021-0011. The ramifications of this vulnerability are serious,” reads the security advisory published by VMware. “All environments are different, have different tolerance for risk, and have different security controls and defense-in-depth to mitigate risk, so customers must make their own decisions on how to proceed. However, given the severity of the vulnerability, we strongly recommend immediate action.”
The flaws addressed by the company have been tracked as CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961.
Below are the details of the vulnerabilities:
- CVE-2022-22954 – server-side template injection remote code execution vulnerability;
- CVE-2022-22955, CVE-2022-22956 – OAuth2 ACS authentication bypass vulnerability;
- CVE-2022-22957, CVE-2022-22958 – JDBC injection remote code execution vulnerabilities.
- CVE-2022-22959 – Cross-Site Request Forgery (CSRF);
- CVE-2022-22960 – privilege escalation;
- CVE-2022-22961 – unauthorized information disclosure.
The good news is that the company is not aware of attacks in the wild exploiting these vulnerabilities.
The complete list of affected versions and hotfixes with download is available here.
Users that cannot immediately fix the issues can apply the Workaround instructions provided by the company.
The company pointed out that workarounds do not remove the vulnerabilities, for this reason, it strongly recommends patching as the simplest and most reliable way to address the flaws.
To read the original article: