First published: Wed Apr 13 2022(Updated: )
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Identity Manager | =3.3.3 | |
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
VMware vRealize Automation | >=8.0<9.0 | |
VMware vRealize Automation | =7.6 | |
VMware Workspace ONE Access | =20.10.0.0 | |
VMware Workspace ONE Access | =20.10.0.1 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22955 is a vulnerability in the OAuth2 ACS framework of VMware Workspace ONE Access that allows authentication bypass.
CVE-2022-22955 exposes endpoints in the authentication framework, enabling a malicious actor to bypass authentication and execute any operation.
CVE-2022-22955 has a severity rating of 9.8 (Critical).
CVE-2022-22955 affects VMware Workspace ONE Access versions 3.3.3, 3.3.4, 3.3.5, 3.3.6, 20.10.0.0, 20.10.0.1, 21.08.0.0, and 21.08.0.1.
More information about CVE-2022-22955 can be found on the VMware Security Advisories page: [https://www.vmware.com/security/advisories/VMSA-2022-0011.html](https://www.vmware.com/security/advisories/VMSA-2022-0011.html)