First published: Fri Aug 05 2022(Updated: )
VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workspace ONE Access and Identity Manager | =3.3.4 | |
VMware Workspace ONE Access and Identity Manager | =3.3.5 | |
VMware Workspace ONE Access and Identity Manager | =3.3.6 | |
VMware Workspace ONE Access | =21.08.0.0 | |
VMware Workspace ONE Access | =21.08.0.1 | |
Linux Kernel | ||
VMware Access | =21.08.0.0 | |
VMware Access | =21.08.0.1 | |
VMware Access | =22.05 | |
VMware Identity Manager Connector | =3.3.4 | |
VMware Identity Manager Connector | =3.3.5 | |
VMware Identity Manager Connector | =3.3.6 | |
VMware Identity Manager Connector | =19.03.0.1 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-31660.
The severity of CVE-2022-31660 is high (7.8).
VMware Workspace ONE Access, Identity Manager, and vRealize Automation version 3.3.4, 3.3.5, and 3.3.6 are affected. VMware One Access version 21.08.0.0 and 21.08.0.1 are also affected.
The vulnerability allows a malicious actor with local access to escalate privileges to 'root'.
No, the Linux Kernel is not vulnerable to CVE-2022-31660.