VMWare published an advisory on 6th April 2022 in which it disclosed 10 new vulnerabilities in VMWare products. One of the ten vulnerabilities is rated Critical, six are rated Important, and three are rated Moderate in severity. All the ten vulnerabilities are assigned CVSS scores from 9.8 to 4.7. Attackers could abuse these vulnerabilities to carry out authentication bypass, remote code execution, privilege escalation, URL injection, path traversal, and cross-site scripting (XSS) attacks on vulnerable VMWare products like VMware Workspace ONE Access (Access), VMware Workspace ONE Access Connector (Access Connector), VMware Identity Manager (vIDM), VMware Identity Manager Connector (vIDM Connector), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager. It is highly recommended that all the VMWare product owners mitigate or patch the 10 new vulnerabilities in these VMWare products (CVE-2022-31656 to CVE-2022-31665).
Out of 10 vulnerabilities, 1 is critical, 6 are high, and 3 are medium in severity as per the CVSS 3.0 rating system.
CVE ID | Description | CVSS Score | Severity |
CVE-2022-31656 | An authentication bypass vulnerability affecting local domain users in VMware Workspace ONE Access, Identity Manager and vRealize Automation. | 9.8 | Critical |
CVE-2022-31658 | A remote code execution vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation. | 8.0 | High |
CVE-2022-31659 | A remote code execution vulnerability in VMware Workspace ONE Access and Identity Manager. | 8.0 | High |
CVE-2022-31660 & CVE-2022-31661 | Privilege escalation vulnerabilities in VMware Workspace ONE Access, Identity Manager and vRealize Automation. | 7.8 | High |
CVE-2022-31664 | Local Privilege Escalation Vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation. | 7.8 | High |
CVE-2022-31665 | A remote code execution vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation. | 7.6 | High |
CVE-2022-31657 | A URL injection vulnerability in VMware Workspace ONE Access and Identity Manager. | 5.9 | Medium |
CVE-2022-31662 | A path traversal vulnerability in VMware Workspace ONE Access, Identity Manager, Connectors and vRealize Automation. | 5.3 | Medium |
CVE-2022-31663 | A reflected cross-site scripting (XSS) vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation. | 4.7 | Medium |
This Table Is Created in Evernote By the Author
There are five products that VMWare has listed in its advisory. They are:
VMware Workspace ONE Access (Access): 21.08.0.1, 21.08.0.0
VMware Workspace ONE Access Connector (Access Connector): 22.05, 21.08.0.1, 21.08.0.0
VMware Identity Manager (vIDM): 3.3.6, 3.3.5, 3.3.4
VMware Identity Manager Connector (vIDM Connector): 3.3.6, 3.3.5, 3.3.4, 19.03.0.1
VMware vRealize Automation (vRA): 8.x, 7.6
VMware Cloud Foundation: 4.4.x, 4.3.x, 4.2.x, 3.x
vRealize Suite Lifecycle Manager: 8.x
These products are impacted only if vIDM is used within their environment.vRealize Automation 8.x is unaffected since it does not use embedded vIDM. If vIDM has been deployed with vRA 8.x, fixes should be applied directly to vIDM.vRealize Automation 7.6 is affected since it uses embedded vIDM.
1. These products are impacted only if vIDM is used within their environment.
2, vRealize Automation 8.x is unaffected since it does not use embedded vIDM. If vIDM has been deployed with vRA 8.x, fixes should be applied directly to vIDM.
3. vRealize Automation 7.6 is affected since it uses embedded vIDM.
VMWare has released patches to address these vulnerabilities. Please download the patches if you want to apply the patches to them. But, there are a few things to be noted before you apply the fix.
Upgrade to Supported Versions: Please check If you are running any unsupported versions of instances. If yes, then you should upgrade your unsupported instances to supported versions no matter, even if they are vulnerable.
Take the Backup: Don’t forget to take the backup of the appliances or a snapshot of the appliances and the data server before you do anything.
Please refer to the below table to download the patches for your VMWare products.
Product Component | Version(s) |
VMware Workspace ONE Access Appliance | 21.08.0.1 |
VMware Workspace ONE Access Appliance | 21.08.0.0 |
VMware Identity Manager Appliance & Connector | 3.3.6 |
VMware Identity Manager Appliance & Connector | 3.3.5 |
VMware Identity Manager Appliance & Connector | 3.3.4 |
VMware Identity Manager Connector | 19.03.0.1 |
VMware Realize Automation 7.6 | 7.6 |
This Table Is Created in Evernote By the Author
Note: The below procedure doesn’t apply for vRA 7.6. There is a separate patch available for vRA 7.6. Please refer to the KB 70911 to apply the patches on vRA 7.6.
Time needed: 10 minutes.
How to Patch VMWare Products?
Login to the appliance with root privileges.
Login to the command line of the appliances using SSH.
Download the patch (HW-160130-Appliance-<Version>.zip)
Download the patch (HW-160130-Appliance-<Version>.zip) for your product and transfer it to the appliances.
Unzip the file.
Use this command to Unzip the downloaded file on the appliance.
# unzip HW-160130-Appliance-<Version>.zip
Change into the unzipped directory.
Use the ‘cd’ command to change the directory.
# cd HW-160130-Appliance-<Version>
Install the patch by running the patch script
Run the installer to install the patch.
# ./HW-160130-applyPatch.sh
Access the Workspace ONE Access Console as an administrator, and browse the System Diagnostics page. It should be green.
You should see a flag file created as HW-160130-<version-number>-hotfix.applied (ex: HW-160130-21.08.0.1-hotfix.applied) in /usr/local/horizon/conf/flags directory if the patch is applied successfully.
2. Repeat this process on all the cluster nodes if you run cluster deployments. You can keep other nodes running in the cluster deployments.
Note:
Once you apply the patch, the workaround will be removed automatically.
If you upgrade the appliance, the patch is needed to apply again for the upgraded version.
There is a separate patch available for vRA 7.6. Please refer the KB 70911.
Don’t apply the patch on top of the problematic patch. Remove the problematic patch before applying the correct patch.
rm -rf /usr/local/horizon/conf/flags/HW-160130-<version-number>-hotfix.applied
There is a workaround for those who are not in a position to apply the permanent patches any time soon. However, they might need to compromise with the loss of certain functionalities. Please read these points carefully before making the decision to go for a workaround over a permanent fix.
Local users may lose their login access.
There could be chances of failing inventory sync If VMware Identity Manager is managed by vRealize Suite Lifecycle Manager.
VMWare has released workarounds to address these vulnerabilities. Please visit this KB to see the procedure to Apply the Workaround for the 10 New Vulnerabilities in VMWare products.
We hope this post would help you know how to patch the 10 new vulnerabilities in VMWare products (CVE-2022-31656 to CVE-2022-31665). Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
How to Fix the 4 New Vulnerabilities in VMware vRealize Log Insight?
How To Patch The 8 New Vulnerabilities In VMWare Products (CVE-2022-22954 to CVE-2022-22961)?
How to Patch the 5 New Vulnerabilities in VMware Workspace ONE Assist
The Power of Automation and Orchestration in Cybersecurity: A Closer Look at SOAR
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.