Patches released by VMware to address a couple of vulnerabilities in the Workspace ONE Access authentication solution also resolve the recent Log4Shell security flaw.
Two new vulnerabilities were fixed, the most severe of which is CVE-2021-22057 (CVSS score of 6.6), an authentication bypass that affects VMware Verify two factor authentication.
By exploiting the vulnerability, a malicious actor who has gained knowledge of the first-factor authentication, may provide it to obtain second-factor authentication from VMware Verify, VMware says.
Tracked as CVE-2021-22056 (CVSS score of 5.5), the second vulnerability is a server-side request forgery (SSRF) flaw that could allow an attacker with network access “to make HTTP requests to arbitrary origins and read the full response.”
While no workarounds are available for these vulnerabilities, both have been addressed with the release of Workspace ONE Access versions 21.08.0.1, 21.08, 20.10.0.1, and 20.10.
The security errors also have an impact on products such as Identity Manager (vIDM), vRealize Automation (vRA), Cloud Foundation, and vRealize Suite Lifecycle Manager.
The patches for these two vulnerabilities, VMware announced, also include fixes for the recent Apache Log4j security issue tracked as CVE-2021-44228. The update addresses CVE-2021-45046 as well.
Formerly VMware Identity Manager, Workspace ONE Access provides features such as multi-factor authentication, single sign-on, and conditional access, with support for SaaS, web and web and native mobile applications.
On Friday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) encouraged users and administrators to apply the necessary patches for a critical vulnerability in Workspace ONE UEM Console that VMware addressed last week.
“VMware has released a security advisory to address a vulnerability in Workspace ONE UEM console. An attacker could exploit this vulnerability to obtain sensitive information,” CISA warned.
Related: VMware Patches Critical Flaw in Workspace ONE UEM Console
Related: Log4Shell Tools and Resources for Defenders – Continuously Updated
Related: VMware Patches File Read, SSRF Vulnerabilities in vCenter Server

More from Ionut Arghire
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- US, Israel Provide Guidance on Securing Remote Access Software
- Blumira Raises $15 Million for SMB-Tailored XDR Platform
- KeePass Update Patches Vulnerability Exposing Master Password
- Google Workspace Gets Passkey Authentication
- Cybersecurity Startup Elba Raises €2.5 Million for Employee-Focused Product
Latest News
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
