First published: Wed Apr 13 2022(Updated: )
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware Identity Manager | =3.3.3 | |
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
VMware vRealize Automation | >=8.0<9.0 | |
VMware vRealize Automation | =7.6 | |
Vmware Vrealize Suite Lifecycle Manager | >=8.0<9.0 | |
VMware Workspace ONE Access | =20.10.0.0 | |
VMware Workspace ONE Access | =20.10.0.1 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerabilities identified in this advisory are CVE-2022-22957 and CVE-2022-22958.
The severity rating for CVE-2022-22957 is 7.2 (High).
The affected software for CVE-2022-22957 includes VMware Workspace ONE Access, Identity Manager, and vRealize Automation.
A malicious actor with administrative access can exploit CVE-2022-22957 by triggering deserialization of untrusted data through a malicious JDBC URI.
You can find additional information about CVE-2022-22957 in the VMware security advisory VMSA-2022-0011.