First published: Mon Apr 11 2022(Updated: )
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Identity Manager | =3.3.3 | |
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
VMware vRealize Automation | >=8.0<=8.6 | |
VMware vRealize Automation | =7.6 | |
VMware Workspace ONE Access | =20.10.0.0 | |
VMware Workspace ONE Access | =20.10.0.1 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Linux kernel | ||
VMware Cloud Foundation | >=4.0<=4.3.1 | |
Vmware Vrealize Suite Lifecycle Manager | >=8.0<=8.2 | |
VMware Workspace ONE Access and Identity Manager | ||
All of | ||
Any of | ||
VMware Identity Manager | =3.3.3 | |
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
VMware vRealize Automation | >=8.0<=8.6 | |
VMware vRealize Automation | =7.6 | |
VMware Workspace ONE Access | =20.10.0.0 | |
VMware Workspace ONE Access | =20.10.0.1 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-22954.
The severity rating of CVE-2022-22954 is critical with a score of 9.8.
The affected software includes VMware Workspace ONE Access and Identity Manager, VMware Identity Manager, VMware vRealize Automation, and VMware Workspace ONE Access.
The vulnerability is exploited through server-side template injection, which allows for remote code execution.
You can find more information about CVE-2022-22954 on the following websites: [Packet Storm Security](http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html) and [VMware Security Advisories](https://www.vmware.com/security/advisories/VMSA-2022-0011.html).