core.vmware.com
Open in
urlscan Pro
3.130.210.188
Public Scan
Submitted URL: https://core.vmware.com/vmsa-2022-0011-questions-answers-faq#section1
Effective URL: https://core.vmware.com/vmsa-2022-0011-questions-answers-faq
Submission: On May 24 via api from DE — Scanned from DE
Effective URL: https://core.vmware.com/vmsa-2022-0011-questions-answers-faq
Submission: On May 24 via api from DE — Scanned from DE
Form analysis
2 forms found in the DOM/search
<form action="/search" id="search-form" class="search-form">
<input type="text" id="filter_keywords" name="search" aria-label="search keywords">
<button class="submit-btn" type="submit" aria-label="Submit">
<svg width="20" height="20">
<use xlink:href="/dist/img/svg-sprite.svg#svg-basic-search"></use>
</svg>
</button>
</form>
<form>
<input class="styled-checkbox" id="directToSignIn" type="checkbox" name="ignore-warning" value="ignore">
<label for="directToSignIn">Check this box to ignore this message in the future.</label>
</form>
Text Content
The Cloud Platform Tech Zone RELATED WEBSITES Visit these other VMware sites for additional resources and content. The VMware family * Product Documentation * Support Knowledge Base * Ports & Protocols * TestDrive * Hands-on Labs * Product Downloads * Beta Software Our YouTube channels * vSphere * vSAN * VMware Cloud Foundation Our Twitter feeds * vSphere * vSAN * VMware Cloud Foundation * vSphere Security * VMwareNews Communities | Customer Connect | VMware.com | Log in Sign in to Tech Zone using your Customer Connect ID * Rate and flag content * Receive recommended reading lists * Enable more powerful searching * Build favorites lists RELATED WEBSITES Visit these other VMware sites for additional resources and content. * * * | Communities | Customer Connect | VMware.com Log in * Products * VMware Cloud Disaster Recovery * VMware Cloud Flex Storage * VMware Cloud Foundation * VMware Validated Solutions * VMware Site Recovery * VMware Site Recovery Manager * VMware vSAN * VMware vSphere * VMware vCenter Server * VMware vSphere Bitfusion * VMware vSphere with Tanzu * VMware vSphere Virtual Volumes * Solutions * AI & Machine Learning * Big Data & Analytics * Business-Critical Applications * Compliance * Disaster Recovery * Healthcare * Modern Applications * Operations Management * Ransomware Resilience * Security * Storage * VDI * Other Solutions * Blog Advanced Search Refine Search by Search Tech ZoneReset FiltersLoad previous filter viewBrowse Tech Zone YOU ARE BEING REDIRECTED TO VMWARE'S CLOUD SERVICES PORTAL (CUSTOMER CONNECT) This message will close in seconds You are about to be redirected to the central VMware login page. Here you can create an account, or login with your existing Customer Connect / Partner Connect / Customer Connect ID. Check this box to ignore this message in the future. Direct me to VMware Sign In Not Rated View as PDF Tags Tags More Share Share Pin Pin Feedback Feedback Toggle Full Screen VMSA-2022-0011: QUESTIONS & ANSWERS * Introduction * Next Expected Update * Resources * Questions & Answers 1. Who is affected? 2. When do I need to act? 3. What should I do to protect myself? 4. Can I just firewall the affected products instead of patching or using the workaround? 5. Is this being exploited "in the wild?" 6. How were the issues discovered? 7. Is VMware Cloud on AWS affected? 8. Are hosted VMware Workspace ONE services affected? 9. Are Carbon Black Cloud services affected? 10. It looks like VMware did maintenance on cloud services. How can I see the status of those services and upcoming maintenance activities? 11. I have extended support on an affected product. How can I get a patch for this? 12. Are there any downsides to using the workaround? 13. Is this a vulnerability in vSphere? 14. Do I have to patch ESXi hosts? 15. Will there be a patch for VMware Cloud Foundation? 16. What are the CVE numbers involved in VMSA-2022-0011? 17. I am using a third-party solution, like Dell EMC VxRail, HPE SimpliVity, and so on. Is it safe for me to apply either the workarounds or the patch? 18. I have feedback about the products and/or processes. How do I provide it to you? 19. Is VMware doing anything about these security issues? 20. Is this related to the Spring4Shell vulnerabilities? * Change Log VMSA-2022-0011: QUESTIONS & ANSWERS INTRODUCTION On April 6, 2022 VMware released VMSA-2022-0011, a critical advisory addressing security vulnerabilities found and resolved in VMware’s Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products. VMware Identity Manager is also an optional external component that can provide authentication and authorization for other products, such as NSX, vRealize Operations, vRealize Log Insight, and vRealize Network Insight. The VMSA will always be the source of truth for what products & versions are affected, the workarounds, and appropriate patches. This document is a corollary to that advisory and contains resources and numerous questions & answers that have been asked regarding this issue in an effort to communicate new information, reduce the need for support calls, and help keep organizations secure. NEXT EXPECTED UPDATE There will not be a regular update schedule for this document. RESOURCES Links to the different resources available: * VMware Security Advisory VMSA-2022-0011 (descriptions of the issues and workarounds) * Frequently Asked Questions for VMSA-2022-0011 (this document) * Tips for Patching VMware vSphere (practical advice for ensuring patching success) * VMware vSphere Security Configuration Guide (baseline security best practices for vSphere) * VMware Ransomware Resource Center (discussion around tactics to help prevent, deter, and recover from attacks) * VMware Ports & Protocols Firewalling Guidance (ports.vmware.com) QUESTIONS & ANSWERS We add new questions and answers to the end of this document to preserve links into the subsections here. Please use the index on the left side to scan the questions -- the question you have might be near the end! WHO IS AFFECTED? Customers who have deployed a product listed in the VMSA. Please note that this might include product & suites that offer VMware Identity Manager (vIDM) components as an optional installation. WHEN DO I NEED TO ACT? This critical vulnerability should be patched or mitigated immediately per the instructions in VMSA-2021-0011. The ramifications of this vulnerability are serious. Organizations that practice change management using the ITIL definitions of change types would consider this an “emergency change.” All environments are different, have different tolerance for risk, and have different security controls and defense-in-depth to mitigate risk, so customers must make their own decisions on how to proceed. However, given the severity of the vulnerability, we strongly recommend immediate action. WHAT SHOULD I DO TO PROTECT MYSELF? To fully protect yourself and your organization please install one of the patch versions listed in the VMware Security Advisory, or use the workarounds listed in the VMSA. There may be other protections available in your organization, depending on your security posture, defense-in-depth strategies, and configurations of virtual machines. All organizations must decide for themselves whether to rely on those protections. CAN I JUST FIREWALL THE AFFECTED PRODUCTS INSTEAD OF PATCHING OR USING THE WORKAROUND? All organizations have different environments and needs. Whether firewalls are appropriate compensating controls in your environment for this particular situation is for customers and their information security staff to assess. IS THIS BEING EXPLOITED "IN THE WILD?" Yes. VMware has confirmed that exploitation of CVE-2022-22954 has occurred in the wild. HOW WERE THE ISSUES DISCOVERED? As specified in our security advisory: "VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting this issue to us." IS VMWARE CLOUD ON AWS AFFECTED? No. ARE HOSTED VMWARE WORKSPACE ONE SERVICES AFFECTED? All issues related to VMSA-2022-0011 have been resolved in hosted Workspace ONE services via code deployment. ARE CARBON BLACK CLOUD SERVICES AFFECTED? No. IT LOOKS LIKE VMWARE DID MAINTENANCE ON CLOUD SERVICES. HOW CAN I SEE THE STATUS OF THOSE SERVICES AND UPCOMING MAINTENANCE ACTIVITIES? https://status.vmware-services.io/ is the status dashboard for VMware Cloud on AWS, which also encompasses many other cloud-based services. https://status.workspaceone.com/ is the status dashboard for VMware Workspace ONE. https://status.carbonblack.com/ is the status dashboard for VMware Carbon Black tools & services. I HAVE EXTENDED SUPPORT ON AN AFFECTED PRODUCT. HOW CAN I GET A PATCH FOR THIS? Please follow the extended support process to request patches and other information. ARE THERE ANY DOWNSIDES TO USING THE WORKAROUND? The only way to remove the vulnerabilities from your environment is to apply patches provided in VMSA-2021-0011. Workarounds, while convenient, do not remove the vulnerabilities, and may introduce additional complexities that patching would not. While the decision to patch or use the workaround is yours, VMware always strongly recommends patching as the simplest and most reliable way to resolve this issue. IS THIS A VULNERABILITY IN VSPHERE? No, but please consult VMSA-2022-0011 for the list of affected products so you can confirm whether any of them are currently in use in your environment. DO I HAVE TO PATCH ESXI HOSTS? ESXi is not affected by this VMSA. WILL THERE BE A PATCH FOR VMWARE CLOUD FOUNDATION? Yes. Please follow the instructions linked in the VMSA itself for patching and/or a workaround. WHAT ARE THE CVE NUMBERS INVOLVED IN VMSA-2022-0011? CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 I AM USING A THIRD-PARTY SOLUTION, LIKE DELL EMC VXRAIL, HPE SIMPLIVITY, AND SO ON. IS IT SAFE FOR ME TO APPLY EITHER THE WORKAROUNDS OR THE PATCH? VMware is proud of the robust partner ecosystem and community built around our products, but we cannot speak to our partners’ solutions. Nor would they want us to. Engineered and integrated solutions like Dell EMC VxRail, HPE SimpliVity, and even VMware Cloud Foundation control their patch levels and configurations as part of their qualification and testing processes. Using security guidance that is not explicitly for that product and product version is never advised. VMware covers VMware Cloud Foundation in our security advisory materials, but if you have additional engineered and integrated solutions in play, you should contact those vendors directly for guidance. I HAVE FEEDBACK ABOUT THE PRODUCTS AND/OR PROCESSES. HOW DO I PROVIDE IT TO YOU? VMware appreciates any and all feedback on our products and processes. Please contact your Account Executive, Solutions Engineer, or Technical Account Manager. They have processes for submitting feedback on your behalf. Please help us help you – many features and improvements have been realized because of suggestions made by customers. If we can make life better for you please tell us how. IS VMWARE DOING ANYTHING ABOUT THESE SECURITY ISSUES? Our product teams always investigate the full impact of a vulnerability on both our products and our environment in order to protect our customers, partners and stakeholders. IS THIS RELATED TO THE SPRING4SHELL VULNERABILITIES? No. Those are covered exclusively in VMSA-2022-0010. CHANGE LOG 2022-04-12, 0745: Updated the answer to "is this being used in the wild?" 2022-04-06, 1023: Updated the "Will there be a patch for VMware Cloud Foundation?" answer to refer to the VMSA itself. 2022-04-06: 0800: Initial release. FILTER TAGS Security Cloud Foundation Cloud Foundation 3.9 Cloud Foundation 4 Cloud Foundation 4.2 Cloud Foundation 4.2.1 Cloud Foundation 4.3 Cloud Foundation 4.3.1 Document Comments Company About Us Executive Leadership Newsroom Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide End User Terms & Conditions Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2022 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Site Map Trademarks Glossary Help Feedback Cookie Settings Modal body text goes here. We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookie Settings Accept All Cookies COOKIE PREFERENCE CENTER GENERAL INFORMATION ON COOKIES GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookie Details * PERFORMANCE PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * FUNCTIONAL FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * ADVERTISING ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * SOCIAL MEDIA SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID View Third Party Cookies * Name cookie name Clear Filters Information storage and access Apply Confirm My Choices Allow All