First published: Fri Aug 05 2022(Updated: )
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Identity Manager | =3.3.4 | |
VMware Identity Manager | =3.3.5 | |
VMware Identity Manager | =3.3.6 | |
Vmware One Access | =21.08.0.0 | |
Vmware One Access | =21.08.0.1 | |
Linux Linux kernel | ||
Vmware Access Connector | =22.05 | |
Vmware Access Connector | =22.08.0.0 | |
Vmware Access Connector | =22.08.0.1 | |
Vmware Identity Manager Connector | =3.3.4 | |
Vmware Identity Manager Connector | =3.3.5 | |
Vmware Identity Manager Connector | =3.3.6 | |
Vmware Identity Manager Connector | =19.03.0.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-31659.
The severity of CVE-2022-31659 is high with a severity value of 7.2.
VMware Identity Manager versions 3.3.4, 3.3.5, and 3.3.6 as well as Vmware One Access versions 21.08.0.0 and 21.08.0.1 are affected by CVE-2022-31659.
A malicious actor with administrator and network access can trigger a remote code execution.
You can find more information about CVE-2022-31659 on the VMware website: https://www.vmware.com/security/advisories/VMSA-2022-0021.html