---
licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0)
licence_link: https://creativecommons.org/licenses/by/4.0/
licence_restrictions: https://cert.europa.eu/legal-notice
licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies
title: 'Critical Vulnerabilities in VMware'
version: '1.1'
number: '2022-025'
date: 'May 24, 2022'
---
_History:_
* _07/04/2022 --- v1.0 -- Initial publication_
* _24/05/2022 --- v1.1 -- Updated with information about active exploitation_
# Summary
On April 6th, VMware released several security patches for critical-severity flaws affecting multiple products. The vulnerabilities identified as `CVE-2022-22954`, `CVE-2022-22955`, `CVE-2022-22956`, `CVE-2022-22957`, and `CVE-2022-22958` can lead to multiple effects such as remote code execution and authentication bypass.
VMware also patched high and medium severity bugs that could be exploited for Cross-Site Request Forgery (CSRF) attacks (`CVE-2022-22959`), privilege escalation (`CVE-2022-22960`), and gain access to information without authorisation (`CVE-2022-22961`) [1].
On May 20th, Unit 42 has observed numerous instances of `CVE-2022-22954` being exploited in the wild [4]. When successful, `CVE-2022-22960` can be leveraged to run commands as a root user. It is strongly recommended to patch as soon as possible [2].
# Technical Details
Here are the technical details of the vulnerabilities :
- `CVE-2022-22954` - CVSS score: 9.8 - VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection.
- `CVE-2022-22955` and `CVE-2022-22956` - CVSS score: 9.8 - VMware Workspace ONE Access has two authentication bypass vulnerabilities in the OAuth2 ACS framework.
- `CVE-2022-22957` and `CVE-2022-22958` - CVSS score: 9.1 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities.
- `CVE-2022-22959` - CVSS score: 8.8 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability.
- `CVE-2022-22960` - CVSS score: 7.8 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.
- `CVE-2022-22961` - CVSS score: 5.3 - VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an information disclosure vulnerability due to returning excess information.
# Affected Products
- VMware Workspace ONE Access (Access)
- VMware Identity Manager (vIDM)
- VMware vRealize Automation (vRA)
- VMware Cloud Foundation
- vRealize Suite Lifecycle Manager
# Recommendations and Workarounds
CERT-EU recommends to apply the patches or the workarounds provided by VMware [2]. While applying workarounds is possible, VMware strongly recommends patching as the simplest and most reliable way to resolve this issue.
VMware has also published a document with additional questions and answers regarding VMSA-2021-0011 [3].
Since vulnerabilities `CVE-2022-22954` and `CVE-2022-22960` are exploited in the wild [4], it is highly recommended to apply the patches as soon as possible.
# References
[1]
[2]
[3]
[4]