• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
vmware releases critical patches for new vulnerabilities affecting multiple products

VMware Releases Critical Patches for New Vulnerabilities Affecting Multiple Products

You are here: Home / General Cyber Security News / VMware Releases Critical Patches for New Vulnerabilities Affecting Multiple Products
April 7, 2022

VMware has produced security updates to patch 8 vulnerabilities spanning its products, some of which could be exploited to start distant code execution attacks.

Tracked from CVE-2022-22954 to CVE-2022-22961 (CVSS scores: 5.3 – 9.8), the issues influence VMware Workspace Just one Access, VMware Id Manager, VMware vRealize Automation, VMware Cloud Foundation, and vRealize Suite Lifecycle Manager.

Five of the 8 bugs are rated Critical, two are rated Significant, and just one is rated Reasonable in severity. Credited with reporting all the vulnerabilities is Steven Seeley of Qihoo 360 Vulnerability Investigation Institute.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

The checklist of flaws is underneath –

  • CVE-2022-22954 (CVSS rating: 9.8) – Server-side template injection remote code execution vulnerability influencing VMware Workspace A person Accessibility and Identity Supervisor
  • CVE-2022-22955 & CVE-2022-22956 (CVSS scores: 9.8) – OAuth2 ACS authentication bypass vulnerabilities in VMware Workspace A single Access
  • CVE-2022-22957 & CVE-2022-22958 (CVSS scores: 9.1) – JDBC injection remote code execution vulnerabilities in VMware Workspace One Entry, Identity Manager, and vRealize Automation
  • CVE-2022-22959 (CVSS rating: 8.8) – Cross-web-site ask for forgery (CSRF) vulnerability in VMware Workspace A person Accessibility, Identity Supervisor, and vRealize Automation
  • CVE-2022-22960 (CVSS rating: 7.8) – Neighborhood privilege escalation vulnerability in VMware Workspace Just one Access, Identification Manager and vRealize Automation, and
  • CVE-2022-22961 (CVSS rating: 5.3) – Details disclosure vulnerability impacting VMware Workspace Just one Accessibility, Id Manager and vRealize Automation

CyberSecurity

Productive exploitation of the aforementioned weaknesses could permit a destructive actor to escalate privileges to root user, gain access to the hostnames of the goal methods, and remotely execute arbitrary code, effectively making it possible for entire takeover.

“This critical vulnerability need to be patched or mitigated quickly,” VMware reported in an notify. “The ramifications of this vulnerability are severe.”

While the virtualization companies supplier mentioned that it has not found any proof that the vulnerabilities have been exploited in the wild, it’s really encouraged to apply the patches to get rid of opportunity threats.

“Workarounds, while hassle-free, do not clear away the vulnerabilities, and may perhaps introduce more complexities that patching would not,” the organization cautioned.

Located this post appealing? Observe THN on Facebook, Twitter  and LinkedIn to browse additional special material we article.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Attack on Ukraine Telecoms Provider Caused by Compromised Employee Credentials

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • VMware Releases Critical Patches for New Vulnerabilities Affecting Multiple Products
  • Attack on Ukraine Telecoms Provider Caused by Compromised Employee Credentials
  • Electric Vehicle Chargers Hacked to Show Porn
  • Hackers Distributing Fake Shopping Apps to Steal Banking Data of Malaysian Users
  • No 10 urges gov and businesses to “act as one” against Russian cyber attacks
  • Ukraine Warns of Cyber attack Aiming to Hack Users’ Telegram Messenger Accounts
  • Report: Apple “neglects” to patch zero-days for older macOS versions
  • Block Warns Eight Million Customers of Insider Breach
  • ‘Treasure hunter’ dark web marketplace Hydra seized and shuttered by German cyber police
  • Almost a Fifth of Global Firms Targeted with Spring4Shell

Copyright © TheCyberSecurity.News, All Rights Reserved.