First published: Tue Oct 31 2023(Updated: )
VMware Workspace ONE UEM console contains an open redirect vulnerability. A malicious actor may be able to redirect a victim to an attacker and retrieve their SAML response to login as the victim user.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workspace ONE UEM | >=22.3.0.2<22.3.0.48 | |
VMware Workspace ONE UEM | >=22.6.0.1<22.6.0.36 | |
VMware Workspace ONE UEM | >=22.9.0.1<22.9.0.29 | |
VMware Workspace ONE UEM | >=22.12.0.1<22.12.0.20 | |
VMware Workspace ONE UEM | >=23.2.0.1<23.2.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20886 is a vulnerability found in the VMware Workspace ONE UEM console that allows an attacker to perform an open redirect and retrieve a victim's SAML response.
CVE-2023-20886 affects the VMware Workspace ONE UEM console by enabling a malicious actor to redirect a victim to an attacker and steal their SAML response for unauthorized access.
CVE-2023-20886 has a severity rating of 8.8 (high).
CVE-2023-20886 affects VMware Workspace ONE UEM versions from 22.3.0.2 to 22.3.0.48, 22.6.0.1 to 22.6.0.36, 22.9.0.1 to 22.9.0.29, 22.12.0.1 to 22.12.0.20, and 23.2.0.1 to 23.2.0.10.
To fix the CVE-2023-20886 vulnerability in VMware Workspace ONE UEM console, it is recommended to upgrade to a version that is not affected by the vulnerability.