VMWare published an advisory on 6th April 2022 in which it has disclosed 8 new vulnerabilities in VMWare products. Five of the eight vulnerabilities are rated Critical, two are rated Important, and one is rated Moderate in severity. All the eight vulnerabilities are assigned CVSS scores from 5.3 to 9.8. Attackers could abuse these vulnerabilities to carry out remote code execution, privilege escalation, and gain access attacks on VMware Workspace ONE Access, VMware Identity Manager, VMware vRealize Automation, VMware Cloud Foundation, and vRealize Suite Lifecycle Manager. It is highly recommended that all the VMWare product owners mitigate or patch the 8 new vulnerabilities in these VMWare products.
Out of eight vulnerabilities, five are critical, two are high, and one is medium as per the CVSS 3.0 rating system.
CVE ID | Description | CVSS Score | Severity |
CVE-2022-22954 | Server-side Template Injection Remote Code Execution Vulnerability in VMware Workspace ONE Access and Identity Manager | 9.8 | Critical |
CVE-2022-22955 & CVE-2022-22956: | OAuth2 ACS Authentication Bypass Vulnerabilities in VMware Workspace ONE Access | 9.8 | Critical |
CVE-2022-22957 & CVE-2022-22958 | JDBC Injection Remote Code Execution Vulnerabilities in VMware Workspace ONE Access, Identity Manager, and vRealize Automation | 9.1 | Critical |
CVE-2022-22959 | Cross-Site Request Forgery Vulnerability in VMware Workspace ONE Access, Identity Manager, and vRealize Automation | 8.8 | High |
CVE-2022-22960 | Local Privilege Escalation Vulnerability in VMware Workspace ONE Access, Identity Manager, and vRealize Automation | 7.8 | Hogh |
CVE-2022-22961 | Information Disclosure Vulnerability in VMware Workspace ONE Access, Identity Manager, and vRealize Automation | 5.3 | Medium |
There are five products that VMWare has listed in its advisory. They are:
VMware Workspace ONE Access (Access): v21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0
VMware Identity Manager (vIDM): v3.3.6, 3.3.5, 3.3.4, and 3.3.3
VMware vRealize Automation (vRA): v8.x and 7.6
VMware Cloud Foundation (VCF): v4.x and 3.x
vRealize Suite Lifecycle Manager: 8.x
There is a workaround for those who are not in a position to apply the permanent patches any time soon. However, they might need to compromise with the loss of certain functionalities. Please read these points carefully before making the decision to go for a workaround over a permanent fix.
It is not possible to modify Workspace ONE Access Configuration Settings (accessed through the https://{FQDN}:8443/cfg/, page) while the workaround is in place. If you need to apply some changes to the configuration, you may need to revert the workaround, then make the necessary modifications and re-apply the workaround again.
There may be a high chance that the System Diagnostics dashboard will go out of the display.
You may need to bear with OAuth2 Token Activation failure if you apply the workaround.
Procedure to Apply the Workaround for the 8 New Vulnerabilities in VMWare products:
Take a snapshot of the appliance before you apply the workaround. Never forget this first step. This would save you from restoring the appliance in case of failure.
Login to the appliance with root privileges.
Download the apply workaround python script and transfer it to the appliances.
Navigate the downloaded python script and run it using the Python compiler. Commands to run the script:
# python3 HW-154129-applyWorkaround.py
# python3 HW-154129-applyWorkaround-vRA-76.py for vRA 7.6
If you want to revert the workaround, download the revert workaround python script onto the appliance and run the script.
# python3 HW-154129-revertWorkaround.py
# python3 HW-154129-revertWorkaround-vRA-76.py for vRA 7.6
Validate the workaround is applied or removed just by verifying the Workspace ONE access appliance configuration webpages running on port 8443 ( https://{FQDN}:8443/cfg/).
If the page is blocked, the workaround is applied.
Repeat this process on all the cluster nodes if you run cluster deployments.
Note: Workaround doesn’t work on older unsupported versions. You may need to upgrade the unsupported version to the newer supported versions.
Please refer to the below table to download the patches for your VMWare products.
Product Component | Version(s) | Validation |
VMware Workspace ONE Access Appliance | 21.08.0.1 | Verify build number from Configurator page – 19539711 |
VMware Workspace ONE Access Appliance | 21.08.0.0 – Updated Apr 07, 2022. | Verify build number from Configurator page – 19539711 |
VMware Workspace ONE Access Appliance | 20.10.0.1 | Verify build number from Configurator page – 19540061 |
VMware Workspace ONE Access Appliance | 20.10.0.0 | Verify build number from Configurator page – 19540061 |
VMware Identity Manager Appliance | 3.3.6 | Validate flags in/usr/local/horizon/conf/flags/ – HW-154129-3.3.6.0-hotfix.applied |
VMware Identity Manager Appliance | 3.3.5 | Validate flags in/usr/local/horizon/conf/flags/ – HW-154129-3.3.5.0i-hotfix.applied |
VMware Identity Manager Appliance | 3.3.4 | Validate flags in/usr/local/horizon/conf/flags/ – HW-154129-3.3.4.0-hotfix.applied |
VMware Identity Manager Appliance | 3.3.3 | Validate flags in/usr/local/horizon/conf/flags/ – HW-154129-3.3.3.0-hotfix.applied |
Procedure to Apply the Patches:Note: The below procedure doesn’t apply for vRA 7.6. There is a separate patch available for vRA 7.6. Please refer to the KB 70911 to apply the patches on vRA 7.6.
Take a snapshot of the appliance before you apply the patch. Never forget this first step. This would save you from restoring the appliance in case of failure.
Login to the appliance with root privileges.
Download the patch for your product and transfer it to the appliances.
Unzip the file.
# unzip HW-154129-Appliance-<Version>.zip
Change into the unzipped directory.
# cd HW-154129-Appliance-<Version>
Install the patch by running the patch script
./HW-154129-applyPatch.sh
Validate the patch has been successfully applied
Access the Workspace ONE Access Console as an administrator, browse the System Diagnostics page. It should be green.
For v20 and v21, browse the Workspace ONE Access Configuration Settings page (https://{FQDN}:8443/cfg/) as administrator and verify the build number. Build number should be 19539711 on v21 and 19540061 on v20.
For v3.x, verify the presence of the HW-154129 flag in the /usr/local/horizon/conf/flags/ location.
Repeat this process on all the cluster nodes if you run cluster deployments. You can keep other nodes running in the cluster deployments.
Note:
Once you apply the patch, the workaround will be removed automatically.
If you upgrade the appliance, patch is needed to apply again for the upgraded version.
There is a separate patch available for vRA 7.6. Please refer the KB 70911.
Don’t apply the patch on top of the problematic patch. Remove the problematic patch before applying the correct patch.
rm -rf /usr/local/horizon/conf/flags/HW-154129-21.08.0.0-hotfix.applied
We hope this post would help you know How to Patch the 8 New Vulnerabilities in VMWare products (CVE-2022-22954 to CVE-2022-22961). Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How to Patch the 3 New Critical Vulnerabilities in Citrix ADC and Gateway Products
How To Fix The 8 New Vulnerabilities In VMWare Products (CVE-2022-22954 to CVE-2022-22961)?
How to Fix CVE-2023-20858- An Injection Vulnerability in VMware Carbon Black App Control Server?
How to Fix the 4 New Vulnerabilities in VMware vRealize Log Insight?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.