VMware Warning: Patch Critical Vulnerabilities 

B2B Cyber ​​Security ShortNews

Share post

VMware releases some updates for several serious vulnerabilities in various products. With some products, it is even possible for attackers to gain administrative access to the products without a password. VMware users should act quickly, patch and close the gaps.

According to VMware, the following products are affected by the gaps and patches are available: Workspace ONE Access, Workspace, ONE Access Connector, Identity Manager, Identity Manager Connector, vRealize Automation, Cloud Foundation and vRealize Suite Lifecycle Manager. The VMware advisory VMSA-2022-0021 lists the individual gaps and the recommended measures for them.

VMware VMSA-2022-0021 explains the issues

These vulnerabilities are authentication bypass, remote code execution, and privilege escalation vulnerabilities. Authentication bypass means an attacker with network access to Workspace ONE Access, VMware Identity Manager, and vRealize Automation can gain administrative access. Remote Code Execution (RCE) means that an attacker can cause the components to run unauthorized commands. Privilege escalation means that an attacker with local access can become root on the virtual appliance. It is extremely important that you take quick steps to patch or mitigate these issues in on-premises deployments. If your organization uses ITIL methods for change management, this is considered an "emergency" change. Information on patches and workarounds can be found in the VMware Security Advisory.

Also who has patched VMSA-2022-0014 must patch VMSA-2022-002

The question immediately arose: do users who have completed the previous patch VMSA-2022-0014 also install the new patch right away. VMware gives a resounding “yes” here! Because VMSA-2022-0021 patches new vulnerabilities on all affected software components.

If you haven't patched VMSA-2022-0014 (11) yet, you only need to run VMSA-2022-0021

If enterprise admins have not already applied the previous patches (VMSA-2022-0014 and VMSA-2022-0011), they can skip ahead to the patches in VMSA-2022-0021. The package checks the previous bugs and patches them at the same time.

More at VMware.com

 


About VMware

VMware is driving the world's digital infrastructure with its business software. The company's solutions in the areas of cloud, mobility, network and security provide more than 500.000 corporate customers worldwide with a dynamic and efficient digital basis for their business success. They are supported by the global VMware partner network, consisting of around 75.000 partners. Based in Palo Alto, California, the company has used its technological innovations for both corporate and social purposes for over 20 years. The German office of VMware is located in Munich. Further information can be found at: www.vmware.com/de. VMware and Carbon Black are registered trademarks of VMware, Inc. or its subsidiaries in the United States and other countries.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more