--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerabilities in VMware' version: '1.1' number: '2022-025' date: 'May 24, 2022' --- _History:_ * _07/04/2022 --- v1.0 -- Initial publication_ * _24/05/2022 --- v1.1 -- Updated with information about active exploitation_ # Summary On April 6th, VMware released several security patches for critical-severity flaws affecting multiple products. The vulnerabilities identified as `CVE-2022-22954`, `CVE-2022-22955`, `CVE-2022-22956`, `CVE-2022-22957`, and `CVE-2022-22958` can lead to multiple effects such as remote code execution and authentication bypass. VMware also patched high and medium severity bugs that could be exploited for Cross-Site Request Forgery (CSRF) attacks (`CVE-2022-22959`), privilege escalation (`CVE-2022-22960`), and gain access to information without authorisation (`CVE-2022-22961`) [1]. On May 20th, Unit 42 has observed numerous instances of `CVE-2022-22954` being exploited in the wild [4]. When successful, `CVE-2022-22960` can be leveraged to run commands as a root user. It is strongly recommended to patch as soon as possible [2]. # Technical Details Here are the technical details of the vulnerabilities : - `CVE-2022-22954` - CVSS score: 9.8 - VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. - `CVE-2022-22955` and `CVE-2022-22956` - CVSS score: 9.8 - VMware Workspace ONE Access has two authentication bypass vulnerabilities in the OAuth2 ACS framework. - `CVE-2022-22957` and `CVE-2022-22958` - CVSS score: 9.1 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities. - `CVE-2022-22959` - CVSS score: 8.8 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. - `CVE-2022-22960` - CVSS score: 7.8 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. - `CVE-2022-22961` - CVSS score: 5.3 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an information disclosure vulnerability due to returning excess information. # Affected Products - VMware Workspace ONE Access (Access) - VMware Identity Manager (vIDM) - VMware vRealize Automation (vRA) - VMware Cloud Foundation - vRealize Suite Lifecycle Manager # Recommendations and Workarounds CERT-EU recommends to apply the patches or the workarounds provided by VMware [2]. While applying workarounds is possible, VMware strongly recommends patching as the simplest and most reliable way to resolve this issue. VMware has also published a document with additional questions and answers regarding VMSA-2021-0011 [3]. Since vulnerabilities `CVE-2022-22954` and `CVE-2022-22960` are exploited in the wild [4], it is highly recommended to apply the patches as soon as possible. # References [1] [2] [3] [4]