VMware Patches Severe Vulnerability in Workspace ONE Access, Identity Manager

VMware on Thursday released security updates for multiple products to address a pair of security bugs, one serious enough to give attackers access to sensitive information.

In an advisory, VMWare warns that a malicious actor with network access to port 443 could tamper with host headers to facilitate access to the /cfg web app, in addition a malicious actor could access /cfg diagnostic endpoints without authentication.

Tracked as CVE-2021-22002 (CVSS score 8.6), the issue exists because VMware Workspace ONE Access and Identity Manager allows access to the /cfg web app and diagnostic endpoints via port 443, with the use of a custom header. The endpoints would normally be accessible on port 8443.

In addition to Workspace ONE Access and Identity Manager (vIDM), VMware products such as vRealize Automation, Cloud Foundation, and Suite Lifecycle Manager are also affected.

The latest patch from VMWare also provide cover for CVE-2021-22003, a security issue where a login interface is unintentionally provided on port 7443.

“A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account,” VMware explained.

In an advisory on Thursday, the Cybersecurity and Infrastructure Security Agency (CISA) urges users to apply the patches and workarounds provided by VMware, to ensure they remain protected.

Related: VMware Patches Vulnerabilities in ESXi, ThinApp

Related: VMware Patches Critical Vulnerability in Carbon Black App Control

Related: VMware Patches Privilege Escalation Vulnerability in Tools for Windows

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *