Multiple vulnerabilities present in VMware products

Alert Severity: High

Issue Date:2022-04-06

Updated On:2022-04-13

CVE(s): CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961

What has happened?

In August 2022, VMware released an updated security advisory (VMSA-2022-0021). Operators need to install the most recent patch to be protected against the Java Database Connectivity (JDBC) Injection Remote Code Execution Vulnerability (CVE-2022-31665).

In April-May 2022, VMware released two security advisories (VMSA-2022-0011 & VSMA-2022-0014) relating to multiple vulnerabilities in their products. Exploiting the vulnerabilities may allow malicious actors to trigger a server-side template injection that may result in remote code execution (CVE-2022-22954); escalate privileges to ‘root’ (CVE-2022-22960 and CVE-2022-22973); and obtain administrative access without the need to authenticate (CVE-2022-22972).

What all products are impacted?

  • VMware Workspace ONE Access (Access)
  • VMware Identity Manager (vIDM)
  • VMware vRealize Automation (vRA)
  • VMware Cloud Foundation
  • vRealize Suite Lifecycle Manager

How to keep my environment Safe from this vulnerability?

Patches are available with VMWare. Who uses VMware products should review the patch status as recommended by VMWare.

Add a Comment

Your email address will not be published.