First published: Fri Aug 05 2022(Updated: )
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
Vmware One Access | =21.08.0.0 | |
Vmware One Access | =21.08.0.1 | |
Linux Linux kernel | ||
Vmware Access Connector | =21.08.0.0 | |
Vmware Access Connector | =21.08.0.1 | |
Vmware Access Connector | =22.05 | |
Vmware Identity Manager Connector | =3.3.4 | |
Vmware Identity Manager Connector | =3.3.5 | |
Vmware Identity Manager Connector | =3.3.6 | |
Vmware Identity Manager Connector | =19.03.0.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31656 is a critical vulnerability that affects VMware Workspace ONE Access, Identity Manager, and vRealize Automation, allowing for an authentication bypass.
CVE-2022-31656 affects VMware Identity Manager versions 3.3.4, 3.3.5, and 3.3.6, as well as VMware One Access versions 21.08.0.0 and 21.08.0.1.
CVE-2022-31656 is classified as critical with a severity value of 9.8.
A malicious actor with network access to the UI can exploit CVE-2022-31656 to gain administrative access without the need to authenticate.
You can find more information about CVE-2022-31656 in the VMware Security Advisory VMSA-2022-0021.