First published: Wed Apr 13 2022(Updated: )
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. A malicious actor can trick a user through a cross site request forgery to unintentionally validate a malicious JDBC URI.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<5.0 | |
VMware Identity Manager | =3.3.3 | |
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
VMware vRealize Automation | >=8.0<9.0 | |
VMware vRealize Automation | =7.6 | |
Vmware Vrealize Suite Lifecycle Manager | >=8.0<9.0 | |
VMware Workspace ONE Access | =20.10.0.0 | |
VMware Workspace ONE Access | =20.10.0.1 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22959 is a cross site request forgery vulnerability in VMware Workspace ONE Access, Identity Manager, and vRealize Automation.
VMware Cloud Foundation, VMware Identity Manager, VMware vRealize Automation, and VMware Workspace ONE Access are affected by CVE-2022-22959.
CVE-2022-22959 has a severity rating of 4.3 (medium).
CVE-2022-22959 is associated with CWE-352 (Cross-Site Request Forgery).
VMware has released security advisories and patches for the affected software. It is recommended to apply the necessary updates to address the vulnerability.