Security Experts:

Exploit Code Published for Critical VMware Security Flaw

The race to mitigate a gaping authentication bypass vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation products just got a lot more urgent.

Just one week after the release of an urgent, high-priority patch with fixes for the issue, VMware is calling attention to publicly available exploit code that provides hackers with a roadmap to obtain administrative access without the need to authenticate

“VMware has confirmed malicious code that can exploit CVE-2022-31656 in impacted products is publicly available,” the company said in an updated critical-level advisory published Tuesday.

As SecurityWeek previously reported, the CVE-2022-31656 vulnerability carries VMware’s highest severity rating (CVSSv3 base score of 9.8) and should be remediated without delay.

[ READ: VMware Ships Urgent Patch for Authentication Bypass Security Hole ]

"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate," VMware warned.

VMware’s update advisory follows the publication of a technical analysis by PetrusViet (a member of VNG Security), the security researcher credited with reporting the bug.  

Separately, VMware shipped security updates to address an unprotected storage of credentials vulnerability in VMware Workstation.  In an advisory, VMware said the moderate-severity issue could allow a malicious actor with local user privileges to access user passwords of the remote server connected through VMware Workstation.

The company also shipped an important-security bulletin to warn of a flaw that allows a malicious hacker with administrative network access to escalate privileges to root.

Related: VMware Ships Urgent Patch for Authentication Bypass Security Hole

Related: VMware Calls Attention to High-Severity vCenter Server Flaw

Related: Critical Code Execution Flaw Haunts VMware Cloud Director

Related: VMware Confirms Workspace One Exploits in the Wild 

view counter
Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. Ryan is a veteran cybersecurity strategist who has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan's past career as a security journalist included bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive's ZDNet, PCMag and PC World. Ryan is a director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world. Follow Ryan on Twitter @ryanaraine.