A couple of vulnerabilities (CVE-2021-22002, CVE-2021-22003) were reported to VMWare, which affects multiple products of VMWare. VMWare has released workaround and patches in order to address the critical vulnerabilities. Let’s learn how to fix critical vulnerabilities on VMWare (CVE-2021-22002, CVE-2021-22003).
CVE-2021-22002 and CVE-2021-22003 vulnerabilities impact multiple VMWare products. Here is the list of the products.
VMware Workspace ONE Access (Access)
VMware Identity Manager (vIDM)
VMware vRealize Automation (vRA)
vRealize Suite Lifecycle Manager
With an extension to the above list. These two vulnerabilities affect some releases of VMWare Workspace ONE Access too. Here you see the table.
Product Component | Version(s) | Guest Operating System |
VMware Workspace ONE Access | 20.10.0.1 | Linux |
VMware Workspace ONE Access | 20.10 | Linux |
VMware Workspace ONE Access | 20.01 | Linux |
VMware Identity Manager | 3.3.5 | Linux |
VMware Identity Manager | 3.3.4 | Linux |
VMware Identity Manager | 3.3.3 | Linux |
VMware Identity Manager | 3.3.2 | Linux |
vRealize Automation (embedded vIDM) | 7.6 | Linux |
This vulnerability lets both VMware Workspace ONE Access and Identity Manager access ‘/cfg web app’ and ‘diagnostic endpoints’ services on port 443, which is supposed to be accessible on port 8443, The services running on 8443 can be accessed on port 443, VMware considered this issue to be of ‘Important‘ severity with a maximum CVSSv3 base score of 8.6.
This flaw can help attackers with network access to port 443 accessing the /cfg web app just by tampering with the host header. The vulnerability also allows attackers to access /cfg diagnostic endpoints without authentication.
This vulnerability allows both VMware Workspace ONE Access and Identity Manager to provide a login interface on port 7443, unintentionally. VMware considered this issue to be of ‘Low‘ severity with a maximum CVSSv3 base score of 3.7.
This flaw lets attackers brute force the login endpoint and user enumeration over port 7443. However, successful brute force is difficult to achieve, in fact, it is impractical to consider when we have a lockout policy configuration in place.
Prechecks before you begin:
Take the snapshot without virtual memory.
Note down current build number from: https://<fqdn_of_appliance>:8443/cfg/login
Download the patch files for your product:
Product | Version |
VMware Workspace ONE Access | 20.10.0.1 |
VMware Workspace ONE Access | 20.10 |
VMware Workspace ONE Access | 20.01 |
VMware Identity Manager | 3.3.5 |
VMware Identity Manager | 3.3.4 |
VMware Identity Manager | 3.3.3 |
VMware Identity Manager | 3.3.2 |
vRealize Automation (vIDM) | 7.6 |
VMWare has released patches to fix the vulnerabilities. VMWare also said it would include the patch in its next release of VMware Workspace ONE Access so that VMWare users may no need to apply the patches explicitly. The procedure written here will remain the same for all the products except vRealize Automation (embedded vIDM) 7.6. There is a different workaround for vRA 7.6, which we will share in the following sections.
Note: vRealize Suite Automation Lifecycle Manager (vRSLCM) 8.x: vRSLCM product suite can be impacted. If vIDM is used within the vRSLCM environment. Moreover, VMware Cloud Foundation (VCF) 4.x: VCF product suites can also be impacted. If vIDM is used within the VCF environment,
Let’s fix the critical vulnerabilities on VMWare (CVE-2021-22002, CVE-2021-22003).
Note: No need to take the entire Workspace ONE Access/vIDM environment offline as patches can be applied independently on each appliance. The patching procedure may take approximately 10 minutes on each appliance, so you can plan this patching process in a rolling fashion.
Patch Installation Procedures for Linux Virtual Appliance:
$ sudo su
Hint: You can use tools like WinSCP to transfer the file to the virtual appliance.
# unzip HW-137959-<appliance version>.zip
# cd HW-137959-<appliance version>
# ./HW-137959-Patch.sh
Request to download the correct file. Or else, your terminal will say “Please download the correct version of the patch”.
Type ‘y’ and press <Enter> to continue
Use the command to check the status of the horizon-workspace# service horizon-workspace status
Or
You can also validate successful patching by launching the Configurator login page: https://<fqdn_of_appliance>:8443/cfg/loginTake the build number from the README.txt file and verify the build version on the configuration login page.
If you are encountered with a problem and you don’t have the backup to roll back. these steps would help you.Login to the appliance and stop the horizon-workspace service.
# service horizon-workspace stop
# deployWar /usr/local/horizon/war/svadmin-webapp-0.1.war cfg
# mv /opt/vmware/horizon/workspace/conf/server.xml.bk /opt/vmware/horizon/workspace/conf/server.xml
# mv /opt/vmware/certproxy/lib/cert-proxy-server-0.1.jar.bk /opt/vmware/certproxy/lib/cert-proxy-server-0.1.jar
# service vmware-certproxy restart
Give up to 3 minutes for the vmware-certproxy service to start. Validate vmware-certproxy has started# service vmware-certproxy status
# rm -f /usr/local/horizon/conf/flags/HW-137959-<appliance-version>.applied
Example (20.10): rm -f /usr/local/horizon/conf/flags/HW-137959-20.10.appliedExample (3.3.5): rm -f /usr/local/horizon/conf/flags/HW-137959-3.3.5.0.applied
# service horizon-workspace restart
Use the command to check the status of the horizon-workspace# service horizon-workspace status
Or
You can also validate successful patching by launching the Configurator login page: https://<fqdn_of_appliance>:8443/cfg/loginThe build number should be the same prior to the deployment of the patch and verify the build version on the configuration login page.
This is how you can fix critical vulnerabilities on VMWare (CVE-2021-22002, CVE-2021-22003).
Thanks for reading this tutorial. Please share this information and help to secure the digital world.
You may also like these articles:
How to Fix CVE-2023-20858- An Injection Vulnerability in VMware Carbon Black App Control Server?
How To Fix CVE-2022-22951(2)- Critical Vulnerabilities In VMware Carbon Black App Control Server
How To Fix CVE-2021-22045- Heap Overflow Vulnerability In VMWare Products?
How to Fix the 4 New Vulnerabilities in VMware vRealize Log Insight?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.