Vulnerabilities

VMware Patches Vulnerabilities in Workspace ONE Access

Patches released by VMware to address a couple of vulnerabilities in the Workspace ONE Access authentication solution also resolve the recent Log4Shell security flaw.

<p><strong><span><span>Patches released by VMware to address a couple of vulnerabilities in the Workspace ONE Access authentication solution also resolve the recent Log4Shell security flaw.</span></span></strong></p>

Patches released by VMware to address a couple of vulnerabilities in the Workspace ONE Access authentication solution also resolve the recent Log4Shell security flaw.

Two new vulnerabilities were fixed, the most severe of which is CVE-2021-22057 (CVSS score of 6.6), an authentication bypass that affects VMware Verify two factor authentication.

By exploiting the vulnerability, a malicious actor who has gained knowledge of the first-factor authentication, may provide it to obtain second-factor authentication from VMware Verify, VMware says.

Tracked as CVE-2021-22056 (CVSS score of 5.5), the second vulnerability is a server-side request forgery (SSRF) flaw that could allow an attacker with network access “to make HTTP requests to arbitrary origins and read the full response.”

While no workarounds are available for these vulnerabilities, both have been addressed with the release of Workspace ONE Access versions 21.08.0.1, 21.08, 20.10.0.1, and 20.10.

The security errors also have an impact on products such as Identity Manager (vIDM), vRealize Automation (vRA), Cloud Foundation, and vRealize Suite Lifecycle Manager.

The patches for these two vulnerabilities, VMware announced, also include fixes for the recent Apache Log4j security issue tracked as CVE-2021-44228. The update addresses CVE-2021-45046 as well.

Formerly VMware Identity Manager, Workspace ONE Access provides features such as multi-factor authentication, single sign-on, and conditional access, with support for SaaS, web and web and native mobile applications.

Advertisement. Scroll to continue reading.

On Friday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) encouraged users and administrators to apply the necessary patches for a critical vulnerability in Workspace ONE UEM Console that VMware addressed last week.

“VMware has released a security advisory to address a vulnerability in Workspace ONE UEM console. An attacker could exploit this vulnerability to obtain sensitive information,” CISA warned.

Related: VMware Patches Critical Flaw in Workspace ONE UEM Console

Related: Log4Shell Tools and Resources for Defenders – Continuously Updated

Related: VMware Patches File Read, SSRF Vulnerabilities in vCenter Server

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version