www.vmware.com
Open in
urlscan Pro
2a02:26f0:1700:383::2ef
Public Scan
URL:
https://www.vmware.com/security/advisories/VMSA-2022-0011.html
Submission: On May 24 via api from DE — Scanned from DE
Submission: On May 24 via api from DE — Scanned from DE
Form analysis
2 forms found in the DOM//www.vmware.com/search.html
<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
<input type="text" name="q" id="ub-search" class="d-none" aria-role="searchbox" role="searchbox">
<a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">
<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
</a>
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
Name: securitysignup — POST https://lists.vmware.com/mailman/subscribe/security-announce
<form accept-charset="UNKNOWN" action="https://lists.vmware.com/mailman/subscribe/security-announce" enctype="application/x-www-form-urlencoded" id="securitysignup" method="post" name="securitysignup">
<input id="securityEmail" name="email" size="25" type="text" placeholder="Enter your email address">
<span class="btn-submit"><button name="email-button" type="submit" onclick="validateEmail();"><i class="fa fa-chevron-right" aria-hidden="true"></i></button></span>
<span class="subscriptionerrorMsg"></span>
</form>
Text Content
Global Search US About Us Resources Store Log in Cloud Services Console Customer Connect Partner Connect * Multi-Cloud * App Platform * Cloud & Edge Infrastructure * Anywhere Workspace * Security * Partners Main Menu TAKE CONTROL OF YOUR MULTI-CLOUD ENVIRONMENT 73% of enterprises use two or more public clouds today. While multi-cloud accelerates digital transformation, it also introduces complexity and risk. Simplicity Across Clouds Is Rare 91% of executives are looking to improve “consistency across [their] public cloud environments." Applications Need to Be Modernized 68% of developers want to expand use of modern application frameworks, APIs and services. Distributed Work Models Are Here to Stay 72% of enterprise employees are working from non-traditional environments. Security Is a Top-Down Concern Risk related to security, data and privacy issues remains the #1 multi-cloud challenge. SEE HOW VMWARE CAN HELP VMWARE CROSS-CLOUD™ SERVICES ENABLE ORGANIZATIONS TO UNLOCK THE POTENTIAL OF MULTI-CLOUD WITH ENTERPRISE SECURITY AND RESILIENCY. BUILD & OPERATE CLOUD NATIVE APPS Give developers the flexibility to use any app framework and tooling for a secure, consistent and fast path to production on any cloud. CONNECT & SECURE APPS & CLOUDS Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud. AUTOMATE & OPTIMIZE APPS & CLOUDS Operate apps and infrastructure consistently, with unified governance and visibility into performance and costs across clouds. ACCESS ANY APP ON ANY DEVICE Empower your employees to be productive from anywhere, with secure, frictionless access to enterprise apps from any device. RUN ENTERPRISE APPS ANYWHERE Run enterprise apps and platform services at scale across public and telco clouds, data centers and edge environments. LEARN ABOUT CROSS-CLOUD SERVICES Main Menu Multi-Cloud Spotlight MODERNIZE FASTER ACROSS CLOUDS MODERNIZE APPS FASTER WITH A MULTI-CLOUD KUBERNETES PLATFORM TO HELP YOU BUILD AND RUN ALL APPS CONSISTENTLY ACROSS CLOUDS. Get on a Faster Path to Prod Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster. Simplify Kubernetes Operations Build and operate a secure, multi-cloud container infrastructure at scale. Pair with App Development Experts Unlock value by modernizing your existing apps and building innovative new products. LEARN MORE APP PLATFORM Build, run, secure, and manage all of your apps across any cloud with application modernization solutions and guidance from VMware. 11 Security Practices to Manage Container Lifecycle Get recommended practices for DevSecOps teams that desire a more modern app methodology. GAIN ACCESS NOW SOLUTIONS & PRODUCTS LEAD WITH DEVELOPER EXPERIENCE Cloud Native Application Development Modern App Dev Practices Modernize Existing Apps Start Your Modernization Tanzu Application Platform Tanzu Data Services REALIZE DEVSECOPS OUTCOMES Carbon Black Container Embrace DevSecOps Secure the Software Supply Chain Tanzu Service Mesh EMBRACE PLATFORM OPS Build a Kubernetes Platform Tanzu Community Edition Tanzu Kubernetes Grid Tanzu for Kubernetes Operations Tanzu Mission Control Tanzu Observability CONNECT & SECURE MODERN APPS Carbon Black Container Container Networking with Antrea Network Security NSX NSX Advanced Load Balancer Tanzu Service Mesh EMERGE AS A CLOUD NATIVE CSP Telco Cloud Automation Telco Cloud Infrastructure Telco Cloud Operations Telco Cloud Platform Telco Cloud Platform – Public Cloud Telco Cloud Platform – RAN VMware RIC QUICK LINKS All Industries ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight POWER OF ANY CLOUD WITH CONSISTENCY OF ONE ACCELERATE CLOUD TRANSFORMATION WITH AN ENTERPRISE INFRASTRUCTURE, MULTI-CLOUD OPERATIONS AND MODERN APP PLATFORM ACROSS THE EDGE AND ANY CLOUD. Connect and Run with Confidence Reduce time-to-value, lower costs, and enhance security while modernizing your private and public cloud infrastructure. Enhance Digital Experiences Securely, reliably, and optimally connect applications in the cloud and at the edge to deliver unique experiences. LEARN MORE CLOUD & EDGE INFRASTRUCTURE Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments. VMware Research: Multi-Cloud Strategies Learn why enterprises find multi-cloud strategies critical for success. SEE INTERACTIVE EBOOK SOLUTIONS & PRODUCTS CLOUD INFRASTRUCTURE EXPLORE VMWARE CLOUD Adopt Multi-Cloud Choose Hybrid Cloud Migrate to the Cloud VMware Cloud Universal SELECT CLOUD INFRASTRUCTURE Alibaba Cloud VMware Service Azure VMware Solution Google Cloud VMware Engine IBM Cloud for VMware Solutions Oracle Cloud VMware Solution VMware Cloud on AWS VMware Cloud on AWS GovCloud (US) VMware Cloud on Dell EMC VMware Cloud Disaster Recovery VMware Cloud Foundation VMware Verified Cloud Providers GET A HYPERCONVERGED INFRASTRUCTURE Dell EMC VxRail NSX NSX Advanced Load Balancer vCenter Server vSAN vSphere OPERATE IN THE CLOUD Accelerate Disaster Recovery Automate the Network Deploy a Sovereign Cloud Enable Cloud Adoption Scale Capacity On Demand TRANSFORM TELCO CLOUD Edge Monetization Network Modernization Network Programmability RAN Disaggregation MANAGE THE CLOUD CloudHealth CloudHealth Secure State vRealize Automation vRealize Cloud Management vRealize Cloud Universal vRealize Log Insight vRealize Network Insight vRealize Operations SECURE CLOUD WORKLOADS Carbon Black Container Carbon Black Workload CloudHealth Secure State NSX Advanced Load Balancer NSX Distributed Firewall NSX Distributed IDS/IPS EDGE ENABLE THE MULTI-CLOUD EDGE Edge Compute Stack Edge Network Intelligence Empower Remote Work Optimize and Secure the WAN SD-WAN Secure Access Secure Access Service Edge (SASE) Telco Edge VMware Cloud Web Security QUICK LINKS All Industries Cloud Platform Tech Zone VMware Tech Zone ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight MULTI-CLOUD & ANYWHERE WORKSPACE EMPOWER YOUR EMPLOYEES TO BE PRODUCTIVE FROM ANYWHERE, WITH SECURE, FRICTIONLESS ACCESS TO ENTERPRISE APPS FROM ANY DEVICE. Deliver an Engaging Experience Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences. Secure Today’s Anywhere Workspace Ease the move to Zero Trust with situational intelligence and connected control points. Automate the Workspace Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management. LEARN MORE ANYWHERE WORKSPACE Enable any employee to work from anywhere, anytime with seamless employee experiences. Remote Work Is No Longer Optional Shift from supporting remote work to becoming an anywhere organization. DOWNLOAD BRIEF SOLUTIONS & PRODUCTS EMBRACE ANYWHERE WORKSPACE Digital Employee Experience Endpoint Protection End User Adoption SaaS App Management Secure Remote Access Virtual Desktops and Applications Web Protection Workspace ONE Workspace ONE UEM ENSURE EXPERIENCE AND PRODUCTIVITY Workspace ONE Access Workspace ONE Assist Workspace ONE Intelligence Workspace ONE Intelligent Hub Workspace ONE Productivity Apps ENABLE MODERN MANAGEMENT Workspace ONE Freestyle Orchestrator Workspace ONE Intelligence Workspace ONE UEM Workspace ONE UEM for Mac Workspace ONE for Windows SCALE WITH VDI & DAAS Horizon Horizon Cloud NSX Advanced Load Balancer Workspace ONE Assist for Horizon EMPOWER FRONTLINE WORKERS Workspace ONE Assist Workspace ONE Intelligence Workspace ONE Launcher Workspace ONE for Rugged Devices Workspace ONE UEM Workspace ONE for Workspace IoT Endpoints SECURE THE HYBRID WORKFORCE Carbon Black Endpoint Secure Access VMware Cloud Web Security Workspace ONE Access Workspace ONE Intelligence QUICK LINKS All Industries Workspace Tech Zone ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight MULTI-CLOUD SECURITY & NETWORKING WITH CONNECTED SECURITY THAT DELIVERS FULL VISIBILITY AND FRICTIONLESS OPERATIONS, YOUR APPS AND DATA ARE MORE SECURE WITH VMWARE, IN ANY ENVIRONMENT. Secure & Connect Workloads Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools. Protect APIs — the New Endpoints Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside. Be Future-Ready Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape. LEARN MORE SECURITY & NETWORKING Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud. Protect Your Multi-Cloud Environments Discover the unique characteristics of malware and how to stay ahead of attacks. GET THREAT REPORT SOLUTIONS & PRODUCTS SECURITY MODERNIZE THE SOC Carbon Black Cloud Carbon Black Endpoint Carbon Black MDR NSX Distributed IDS/IPS NSX Network Detection and Response NSX Sandbox Security Professional Services SECURE MULTI-CLOUD WORKLOADS Carbon Black App Control Carbon Black Container Carbon Black Workload CloudHealth Secure State NSX Distributed Firewall NSX Distributed IDS/IPS Ransomware Protection SECURE MODERN APPS Carbon Black Container Container Networking with Antrea Tanzu Service Mesh SECURE THE HYBRID WORKFORCE Carbon Black App Control Carbon Black Endpoint SASE Platform SD-WAN Secure Access NETWORKING BUILD A MODERN NETWORK Accelerate Cloud Adoption Automate the Network Connect and Secure Modern Apps Connect Containers and Kubernetes Container Networking with Antrea NSX NSX Advanced Load Balancer NSX Distributed Firewall Rethink Application Delivery Tanzu Service Mesh STRENGTHEN APP & NETWORK ACCESS Edge Network Intelligence Empower Remote Work Optimize and Secure the WAN SD-WAN Secure Access Secure Access Service Edge (SASE) VMware Cloud Web Security SECURE YOUR NETWORK NSX Distributed Firewall NSX Distributed IDS/IPS NSX Firewall NSX Gateway Firewall NSX Network Detection & Response NSX Sandbox AUTOMATE THE NETWORK Global Network Identities HCX Workload Mobility NSX Intelligence vRealize Network Insight QUICK LINKS All Industries Carbon Black Tech Zone NSX Tech Zone ALL PRODUCTS ALL SOLUTIONS Main Menu Multi-Cloud Spotlight TRUSTED ADVISORS ON MULTI-CLOUD JOURNEY PARTNERS ARE TRUSTED ADVISORS TO GUIDE CUSTOMERS’ JOURNEYS TO MULTI-CLOUD, ENABLING DIGITAL INNOVATION WITH ENTERPRISE CONTROL. Work with a VMware Partner Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers. Become a Partner Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers. LEARN MORE PARTNERS With thousands of partners worldwide, we are positioned to help customers scale their business, drive innovation and transform their customer experience. Working Together with Partners for Customer Success See how we work with a global partner to help companies prepare for multi-cloud. VIEW PARTNER STORY SOLUTIONS FOR CUSTOMERS Find a Cloud Provider Find a Partner VMware Marketplace Work with a Partner FOR PARTNERS Become a Cloud Provider Cloud Partner Navigator Get Cloud Verified Learning and Selling Resources Partner Connect Login Partner Executive Edge Technology Partner Hub Work with VMware Ellipsis VMware Security Solutions Advisories VMSA-2022-0011 Critical Advisory ID: VMSA-2022-0011.1 CVSSv3 Range: 5.3-9.8 Issue Date: 2022-04-06 Updated On: 2022-04-13 CVE(s): CVE-2022-22954, CVE-2022-22955,CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 Synopsis: VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities. RSS Feed Download PDF Download Text File Share this page on social media Sign up for Security Advisories 1. IMPACTED PRODUCTS * VMware Workspace ONE Access (Access) * VMware Identity Manager (vIDM) * VMware vRealize Automation (vRA) * VMware Cloud Foundation * vRealize Suite Lifecycle Manager 2. INTRODUCTION Multiple vulnerabilities were privately reported to VMware. Patches are available to remediate these vulnerabilities in affected VMware products. 3A. SERVER-SIDE TEMPLATE INJECTION REMOTE CODE EXECUTION VULNERABILITY (CVE-2022-22954) Description VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Known Attack Vectors A malicious actor with network access can trigger a server-side template injection that may result in remote code execution. Resolution To remediate CVE-2022-22954, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds Workarounds for CVE-2022-22954 have been documented in the VMware Knowledge Base articles listed in the 'Workarounds' column of the 'Response Matrix' below. Additional Documentation A supplemental blog post was created for additional clarification. Please see: https://via.vmw.com/vmsa-2022-0011-qna Notes VMware has confirmed that exploitation of CVE-2022-22954 has occurred in the wild. Acknowledgements VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting these issues to us. 3B. OAUTH2 ACS AUTHENTICATION BYPASS VULNERABILITIES (CVE-2022-22955, CVE-2022-22956) Description VMware Workspace ONE Access has two authentication bypass vulnerabilities in the OAuth2 ACS framework. VMware has evaluated the severity of these issues to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Known Attack Vectors A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework. Resolution To remediate CVE-2022-22955 and CVE-2022-22956, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds Workarounds for CVE-2022-22955 and CVE-2022-22956 have been documented in the VMware Knowledge Base articles listed in the 'Workarounds' column of the 'Response Matrix' below. Additional Documentation A supplemental blog post was created for additional clarification. Please see: https://via.vmw.com/vmsa-2022-0011-qna Notes These issues only impact Workspace ONE Access. Acknowledgements VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting these issues to us. 3C. JDBC INJECTION REMOTE CODE EXECUTION VULNERABILITIES (CVE-2022-22957, CVE-2022-22958) Description VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities. VMware has evaluated the severity of these issues to be in the Critical severity range with a maximum CVSSv3 base score of 9.1. Known Attack Vectors A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution. Resolution To remediate CVE-2022-22957 and CVE-2022-22958, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds Workarounds for CVE-2022-22957 and CVE-2022-22958 have been documented in the VMware Knowledge Base articles listed in the 'Workarounds' column of the 'Response Matrix' below. Additional Documentation A supplemental blog post was created for additional clarification. Please see: https://via.vmw.com/vmsa-2022-0011-qna Notes None. Acknowledgements VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting these issues to us. 3D. CROSS SITE REQUEST FORGERY VULNERABILITY (CVE-2022-22959) Description VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.8. Known Attack Vectors A malicious actor can trick a user through a cross site request forgery to unintentionally validate a malicious JDBC URI. Resolution To remediate CVE-2022-22959, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds Workarounds for CVE-2022-22959 have been documented in the VMware Knowledge Base articles listed in the 'Workarounds' column of the 'Response Matrix' below. Additional Documentation A supplemental blog post was created for additional clarification. Please see: https://via.vmw.com/vmsa-2022-0011-qna Notes None. Acknowledgements VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting these issues to us. 3E. LOCAL PRIVILEGE ESCALATION VULNERABILITY (CVE-2022-22960) Description VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.8. Known Attack Vectors A malicious actor with local access can escalate privileges to 'root'. Resolution To remediate CVE-2022-22960, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds Workarounds for CVE-2022-22960 have been documented in the VMware Knowledge Base articles listed in the 'Workarounds' column of the 'Response Matrix' below. Additional Documentation A supplemental blog post was created for additional clarification. Please see: https://via.vmw.com/vmsa-2022-0011-qna Notes VMware has confirmed that exploitation of CVE-2022-22960 has occurred in the wild. Acknowledgements VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting these issues to us. 3F. INFORMATION DISCLOSURE VULNERABILITY (CVE-2022-22961) Description VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an information disclosure vulnerability due to returning excess information. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3. Known Attack Vectors A malicious actor with remote access may leak the hostname of the target system. Successful exploitation of this issue can lead to targeting victims. Resolution To remediate CVE-2022-22961, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds Workarounds for CVE-2022-22961 have been documented in the VMware Knowledge Base articles listed in the 'Workarounds' column of the 'Response Matrix' below. Additional Documentation A supplemental blog post was created for additional clarification. Please see: https://via.vmw.com/vmsa-2022-0011-qna Notes None. Acknowledgements VMware would like to thank Steven Seeley (mr_me) of Qihoo 360 Vulnerability Research Institute for reporting these issues to us. Response Matrix - Access 21.08.x: Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation Access 21.08.0.1, 21.08.0.0 Linux CVE-2022-22954 9.8 critical KB88099 KB88098 FAQ Access 21.08.0.1, 21.08.0.0 Linux CVE-2022-22955, CVE-2022-22956 9.8 critical KB88099 KB88098 FAQ Access 21.08.0.1, 21.08.0.0 Linux CVE-2022-22957, CVE-2022-22958 9.1 critical KB88099 KB88098 FAQ Access 21.08.0.1, 21.08.0.0 Linux CVE-2022-22959 8.8 important KB88099 KB88098 FAQ Access 21.08.0.1, 21.08.0.0 Linux CVE-2022-22960 7.8 important KB88099 KB88098 FAQ Access 21.08.0.1, 21.08.0.0 Linux CVE-2022-22961 5.3 moderate KB88099 None FAQ Response Matrix - Access 20.10.x: Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation Access 20.10.0.1, 20.10.0.0 Linux CVE-2022-22954 9.8 critical KB88099 KB88098 FAQ Access 20.10.0.1, 20.10.0.0 Linux CVE-2022-22955, CVE-2022-22956 9.8 critical KB88099 KB88098 FAQ Access 20.10.0.1, 20.10.0.0 Linux CVE-2022-22957, CVE-2022-22958 9.1 critical KB88099 KB88098 FAQ Access 20.10.0.1, 20.10.0.0 Linux CVE-2022-22959 8.8 important KB88099 KB88098 FAQ Access 20.10.0.1, 20.10.0.0 Linux CVE-2022-22960 7.8 important KB88099 KB88098 FAQ Access 20.10.0.1, 20.10.0.0 Linux CVE-2022-22961 5.3 moderate KB88099 None FAQ Response Matrix - Identity Manager 3.3.x: Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation vIDM 3.3.6, 3.3.5, 3.3.4, 3.3.3 Linux CVE-2022-22954 9.8 critical KB88099 KB88098 FAQ vIDM 3.3.6, 3.3.5, 3.3.4, 3.3.3 Linux CVE-2022-22955, CVE-2022-22956 N/A N/A Unaffected N/A N/A vIDM 3.3.6, 3.3.5, 3.3.4, 3.3.3 Linux CVE-2022-22957, CVE-2022-22958 9.1 critical KB88099 KB88098 FAQ vIDM 3.3.6, 3.3.5, 3.3.4, 3.3.3 Linux CVE-2022-22959 8.8 important KB88099 KB88098 FAQ vIDM 3.3.6, 3.3.5, 3.3.4, 3.3.3 Linux CVE-2022-22960 7.8 important KB88099 KB88098 FAQ vIDM 3.3.6, 3.3.5, 3.3.4, 3.3.3 Linux CVE-2022-22961 5.3 moderate KB88099 None FAQ Response Matrix - vRealize Automation (vIDM): Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation vRealize Automation [1] 8.x Linux CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 N/A N/A Unaffected N/A N/A vRealize Automation (vIDM) 7.6 Linux CVE-2022-22954 N/A N/A Unaffected N/A N/A vRealize Automation (vIDM) 7.6 Linux CVE-2022-22955, CVE-2022-22956 N/A N/A Unaffected N/A N/A vRealize Automation (vIDM) [2] 7.6 Linux CVE-2022-22957, CVE-2022-22958 9.1 critical KB88099 KB88098 FAQ vRealize Automation (vIDM) [2] 7.6 Linux CVE-2022-22959 8.8 important KB88099 KB88098 FAQ vRealize Automation (vIDM) [2] 7.6 Linux CVE-2022-22960 7.8 important KB88099 KB88098 FAQ vRealize Automation (vIDM) 7.6 Linux CVE-2022-22961 N/A N/A Unaffected N/A N/A [1] vRealize Automation 8.x is unaffected since it does not use embedded vIDM. If vIDM has been deployed with vRA 8.x, fixes should be applied directly to vIDM. [2] vRealize Automation 7.6 is affected since it uses embedded vIDM. Impacted Product Suites that Deploy Response Matrix Components: Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation VMware Cloud Foundation (vIDM) 4.x Any CVE-2022-22954, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 9.8, 9.1, 9.1, 8.8, 7.8, 5.3 critical KB88099 KB88098 FAQ VMware Cloud Foundation (vRA) 3.x Any CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960 9.1, 9.1, 8.8, 7.8 critical KB88099 KB88098 FAQ vRealize Suite Lifecycle Manager (vIDM) 8.x Any CVE-2022-22954, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 9.8, 9.1, 9.1, 8.8, 7.8, 5.3 critical KB88099 KB88098 FAQ 4. REFERENCES Fixed Version(s): https://kb.vmware.com/s/article/88099 Workarounds: https://kb.vmware.com/s/article/88098 Mitre CVE Dictionary Links: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22954 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22955 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22956 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22957 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22959 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22961 FIRST CVSSv3 Calculator: CVE-2022-22954: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2022-22955: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2022-22956: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2022-22957: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2022-22958: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2022-22959: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2022-22960: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2022-22961: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5. CHANGE LOG 2022-04-06: VMSA-2022-0011 Initial security advisory. 2022-04-13: VMSA-2022-0011.1 VMware has confirmed that exploitation of CVE-2022-22954 has occurred in the wild. 6. CONTACT E-mail list for product security notifications and announcements: https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2022 VMware Inc. All rights reserved. Company About Us Executive Leadership News & Stories Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide End User Terms & Conditions California Transparency Act Statement Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2022 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Site Map Trademarks Glossary Help Cookie Settings We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookie Settings Accept All Cookies COOKIE PREFERENCE CENTER GENERAL INFORMATION ON COOKIES GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookie Details * PERFORMANCE PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookie Details * FUNCTIONAL FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookie Details * ADVERTISING ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookie Details * SOCIAL MEDIA SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookie Details Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID View Third Party Cookies * Name cookie name Clear Filters Information storage and access Apply Confirm My Choices Allow All