Patches released by VMware to address a couple of vulnerabilities in the Workspace ONE Access authentication solution also resolve the recent Log4Shell security flaw.
Two new vulnerabilities were fixed, the most severe of which is CVE-2021-22057 (CVSS score of 6.6), an authentication bypass that affects VMware Verify two factor authentication.
By exploiting the vulnerability, a malicious actor who has gained knowledge of the first-factor authentication, may provide it to obtain second-factor authentication from VMware Verify, VMware says.
Tracked as CVE-2021-22056 (CVSS score of 5.5), the second vulnerability is a server-side request forgery (SSRF) flaw that could allow an attacker with network access “to make HTTP requests to arbitrary origins and read the full response.”
While no workarounds are available for these vulnerabilities, both have been addressed with the release of Workspace ONE Access versions 21.08.0.1, 21.08, 220.127.116.11, and 20.10.
The security errors also have an impact on products such as Identity Manager (vIDM), vRealize Automation (vRA), Cloud Foundation, and vRealize Suite Lifecycle Manager.
The patches for these two vulnerabilities, VMware announced, also include fixes for the recent Apache Log4j security issue tracked as CVE-2021-44228. The update addresses CVE-2021-45046 as well.
Formerly VMware Identity Manager, Workspace ONE Access provides features such as multi-factor authentication, single sign-on, and conditional access, with support for SaaS, web and web and native mobile applications.
On Friday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) encouraged users and administrators to apply the necessary patches for a critical vulnerability in Workspace ONE UEM Console that VMware addressed last week.
“VMware has released a security advisory to address a vulnerability in Workspace ONE UEM console. An attacker could exploit this vulnerability to obtain sensitive information,” CISA warned.
Related: VMware Patches Critical Flaw in Workspace ONE UEM Console
Related: Log4Shell Tools and Resources for Defenders – Continuously Updated
Related: VMware Patches File Read, SSRF Vulnerabilities in vCenter Server