Authentication bypass in VMware Workspace ONE Access, Identity Manager and vRealize Automation



| Updated: 2022-08-10
Risk Critical
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-31656
CWE-ID CWE-287
Exploitation vector Network
Public exploit N/A
Vulnerable software
VMware Workspace One Access
Operating systems & Components / Operating system package or component

VMware Identity Manager
Server applications / Directory software, identity management

Aria Automation (formerly vRealize Automation)
Server applications / Directory software, identity management

vRealize Suite Lifecycle Manager
Other software / Other software solutions

Cloud Foundation
Client/Desktop applications / Virtualization software

Vendor VMware, Inc

Security Bulletin

This security bulletin contains one critical risk vulnerability.

1) Improper Authentication

EUVDB-ID: #VU65957

Risk: Critical

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red]

CVE-ID: CVE-2022-31656

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an error in authentication process affecting local domain users. A remote non-authenticated attacker with access to the UI can bypass authentication process and gain administrative access to the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

VMware Workspace One Access: 21.08.0.0 - 21.08.0.1

VMware Identity Manager: 3.3.4 - 3.3.6

Aria Automation (formerly vRealize Automation): 7.6

vRealize Suite Lifecycle Manager: 8.0 - 8.4.1 Patch 2

Cloud Foundation: 4.2 - 4.4

CPE2.3 External links

https://www.vmware.com/security/advisories/VMSA-2022-0021.html
https://core.vmware.com/vmsa-2022-0021-questions-answers-faq
https://kb.vmware.com/s/article/89096
https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###