Patches released by VMware to address a couple of vulnerabilities in the Workspace ONE Access authentication solution also resolve the recent Log4Shell security flaw.
Two new vulnerabilities were fixed, the most severe of which is CVE-2021-22057 (CVSS score of 6.6), an authentication bypass that affects VMware Verify two factor authentication.
By exploiting the vulnerability, a malicious actor who has gained knowledge of the first-factor authentication, may provide it to obtain second-factor authentication from VMware Verify, VMware says.
Tracked as CVE-2021-22056 (CVSS score of 5.5), the second vulnerability is a server-side request forgery (SSRF) flaw that could allow an attacker with network access “to make HTTP requests to arbitrary origins and read the full response.”
While no workarounds are available for these vulnerabilities, both have been addressed with the release of Workspace ONE Access versions 21.08.0.1, 21.08, 20.10.0.1, and 20.10.
The security errors also have an impact on products such as Identity Manager (vIDM), vRealize Automation (vRA), Cloud Foundation, and vRealize Suite Lifecycle Manager.
The patches for these two vulnerabilities, VMware announced, also include fixes for the recent Apache Log4j security issue tracked as CVE-2021-44228. The update addresses CVE-2021-45046 as well.
Formerly VMware Identity Manager, Workspace ONE Access provides features such as multi-factor authentication, single sign-on, and conditional access, with support for SaaS, web and web and native mobile applications.
On Friday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) encouraged users and administrators to apply the necessary patches for a critical vulnerability in Workspace ONE UEM Console that VMware addressed last week.
“VMware has released a security advisory to address a vulnerability in Workspace ONE UEM console. An attacker could exploit this vulnerability to obtain sensitive information,” CISA warned.
Related: VMware Patches Critical Flaw in Workspace ONE UEM Console
Related: Log4Shell Tools and Resources for Defenders – Continuously Updated
Related: VMware Patches File Read, SSRF Vulnerabilities in vCenter Server

More from Ionut Arghire
- Dozens of Malicious Extensions Found in Chrome Web Store
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
Latest News
- Dozens of Malicious Extensions Found in Chrome Web Store
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
