VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vmware identity manager 3.3.4 |
||
vmware identity manager 3.3.5 |
||
vmware identity manager 3.3.6 |
||
vmware one access 21.08.0.0 |
||
vmware one access 21.08.0.1 |
||
vmware access connector 21.08.0.0 |
||
vmware access connector 21.08.0.1 |
||
vmware access connector 22.05 |
||
vmware identity manager connector 3.3.4 |
||
vmware identity manager connector 3.3.5 |
||
vmware identity manager connector 3.3.6 |
||
vmware identity manager connector 19.03.0.1 |
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Meanwhile, a security update for rsync What do you want on The Register?
VMware has fixed a critical authentication bypass vulnerability that hits 9.8 out of 10 on the CVSS severity scale and is present in multiple products. That flaw is tracked as CVE-2022-31656, and affects VMware's Workspace ONE Access, Identity Manager, and vRealize Automation. It was addressed along with nine other security holes in this patch batch, published Tuesday. Here's the bottom line of the '31656 bug, according to VMware: "A malicious actor with network access to the UI may be able to o...