First published: Fri Aug 05 2022(Updated: )
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workspace ONE Access and Identity Manager | =3.3.4 | |
VMware Workspace ONE Access and Identity Manager | =3.3.5 | |
VMware Workspace ONE Access and Identity Manager | =3.3.6 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Kernel | ||
VMware Access | =21.08.0.0 | |
VMware Access | =21.08.0.1 | |
VMware Access | =22.05 | |
VMware Identity Manager Connector | =3.3.4 | |
VMware Identity Manager Connector | =3.3.5 | |
VMware Identity Manager Connector | =3.3.6 | |
VMware Identity Manager Connector | =19.03.0.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31658 has been classified with a high severity due to its potential for remote code execution.
To fix CVE-2022-31658, update to the latest patched versions of VMware Workspace ONE Access or VMware Identity Manager as recommended by VMware.
CVE-2022-31658 affects specific versions of VMware Workspace ONE Access, VMware Identity Manager, and VMware Identity Manager Connector.
CVE-2022-31658 is classified as a remote code execution vulnerability that can be exploited by malicious actors.
CVE-2022-31658 can be exploited by a malicious actor with administrator and network access to the vulnerable systems.