The proof-of-concept exploit code is publicly available for a critical authentication bypass vulnerability in multiple VMware products that allows attackers to gain administrative privileges.
VMware has previously released updates to the vulnerability (CVE-2022-31656, CVSS: N/A) affecting VMware Workspace ONE Access, Identity Manager and vRealize Automation.
A high severity SQL injection flaw (CVE-2022-31659, CVSS: N/A) and other flaws that allowed remote attackers to remotely execute code were patched the same day.
“Confirmed malicious code that can exploit CVE-2022-31656 and CVE-2022-31659 in impacted products is publicly available” in VMware’s updated advisory.
A proof-of-concept (PoC) vulnerability and detailed technical analysis for the bug have been released by VNG Security researcher Petrus Viet, who discovered and reported the flaw.
He said last week that a CVE-2022-22972 (CVSS: 9.8 Critical) PoC will be made available this week.
This is a detailed technical analysis of two vulnerabilities CVE-2022-31656 and CVE-2022-31659 affecting VMware Workspace ONE Access, Identity Manager, and vRealize Automation. I hope it helps you and sorry for my bad english.
[ENG] https://t.co/lOXEUvEyPV
— Petrus Viet (@VietPetrus) August 9, 2022
In a post by Bob Plankers on the VMware Security Blog, “It is extremely important that you quickly take steps to patch or mitigate these issues in on-premises deployments.”
“If your organization uses ITIL methodologies for change management, this would be considered an “emergency” change.”
In another published document, VMware says it was not aware of these vulnerabilities being exploited.
The company has posted download links for patches and detailed installation instructions on its website.
Shared a temporary workaround for unpatched devices with vulnerabilities. Requested to disable all users except the authorized administrator.
All unpatched devices should be immediately updated or taken offline to avoid compromise, as threat actors will likely develop their own exploits for use in attacks.Failure to do so can lead to network breaches and serious attacks such as ransomware distribution and data theft.
References:
https://blogs.vmware.com/security/2022/08/vmsa-2022-0021-what-you-need-to-know.html
https://kb.vmware.com/s/article/89096
https://core.vmware.com/vmsa-2022-0021-questions-answers-faq#sec21458-sub3
https://mobile.twitter.com/VietPetrus/status/1556999921320235009