www.techtarget.com
Open in
urlscan Pro
2606:4700:4400::6812:2a27
Public Scan
URL:
https://www.techtarget.com/searchsecurity/news/252515988/VMware-Workspace-One-flaw-actively-exploited-in-the-wild
Submission: On April 18 via api from US — Scanned from DE
Submission: On April 18 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.techtarget.com/search/query
<form action="https://www.techtarget.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>
Text Content
SearchSecurity Search the TechTarget Network Sign-up now. Start my free, unlimited access. Login Register * Techtarget Network * News * Features * Tips * Webinars * More Content * Answers * Definitions * Essential Guides * Opinions * Photo Stories * Podcasts * Quizzes * Tech Accelerators * Tutorials * Sponsored Communities * Schools * SearchSecurity * Topic Threats and vulnerabilities * Application and platform security * Careers and certifications * Cloud security * Compliance * Data security and privacy * Identity and access management * Network security * Risk management * Security analytics and automation * Security operations and management * Threat detection and response * All Topics * Follow: * * * News VMWARE WORKSPACE ONE FLAW ACTIVELY EXPLOITED IN THE WILD MULTIPLE THREAT INTELLIGENCE PROVIDERS HAVE DETECTED THREAT ACTIVITY RELATED TO THE VMWARE WORKSPACE ONE FLAW, INCLUDING CRYPTOCURRENCY MINING ACTIVITY. Share this item with your network: * * * By * Alexander Culafi, News Writer Published: 14 Apr 2022 A critical vulnerability in VMware's Workspace One is under active exploitation, the cloud software vendor said in a Wednesday security advisory update. The vulnerability is CVE-2022-22954, a server-side template injection flaw capable of remote code execution. It affects Workspace One's Access and Identity Manager, part of Workspace One's larger IT management suite. The flaw was patched April 6 alongside seven others -- most of which were high or critical severity. Workarounds are also available. Complete details about CVE-2022-22954, CVE-2022-22955,CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960 and CVE-2022-22961 are available in VMware's security advisory. What makes CVE-2022-22954 distinct from the other critical vulnerabilities is that on Wednesday, VMware updated its advisory to confirm that the vulnerability has been exploited in the wild. Earlier this week, multiple researchers published proofs of concept, or POCs, of the exploit on Twitter -- at least one of which is available in greater detail on GitHub. Additionally, multiple threat intelligence providers have detected threat actor activity resulting from the flaw this week, including Bad Packets and GreyNoise Intelligence, as well as prominent threat researcher Daniel Card. Card tweeted Wednesday -- the same day VMware confirmed exploitation -- that cryptocurrency miners were being deployed, and to "expect ransomware soon." VMware also released a workaround for CVE-2022-22954. However, the vendor noted in a Q&A that the only way to fully remove the vulnerabilities is to patch them. "Workarounds, while convenient, do not remove the vulnerabilities, and may introduce additional complexities that patching would not," the Q&A read. "While the decision to patch or use the workaround is yours, VMware always strongly recommends patching as the simplest and most reliable way to resolve this issue." A VMware spokesperson shared the following statement with SearchSecurity: "VMware has updated our March 6 security advisory to confirm that exploitation of CVE-2022-22954 has occurred in the wild, and we continue to urge customers to apply the patches or workarounds provided in the advisory, VMSA-2022-0011. The security of our customers is a top priority, and VMware encourages customers to deploy our all our products in a security-hardened configuration and apply the latest product updates for their environment." Alexander Culafi is a writer, journalist and podcaster based in Boston. RELATED RESOURCES * Five Tips to Improve a Threat and Vulnerability Management Program –SearchSecurity.com * Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud –SearchSecurity.com * WhiteHat Sentinel Mobile: Datasheet –WhiteHat Security * Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures –ComputerWeekly.com DIG DEEPER ON THREATS AND VULNERABILITIES * MICROSOFT PLUGS WINDOWS ZERO-DAY ON APRIL PATCH TUESDAY By: Tom Walat * SPRING FRAMEWORK VULNERABILITIES SOW CONFUSION, CONCERN By: Shaun Nichols * RESEARCHERS DISCLOSE NEW SPECTRE V2 VULNERABILITIES By: Shaun Nichols * MICROSOFT SERVES UP THREE ZERO-DAYS ON MARCH PATCH TUESDAY By: Alex Scroxton Sponsored News * To Accelerate Digital Transformation, the Path to Hybrid Cloud Should Be Simple... –Dell Technologies * 4 Ways to Reduce Threats in a Growing Attack Surface –Dell Technologies * What to Look for in a Secure Cloud Portfolio to Optimize Federal Cybersecurity ... –Dell Technologies * See More Related Content * Spring Framework vulnerabilities sow confusion, ... – SearchSecurity * Russian state actors exploiting VMware bug to hijack ... – ComputerWeekly.com * Russian state-sponsored hackers exploit VMware ... – SearchSecurity Latest TechTarget resources * Cloud Security * Networking * CIO * Enterprise Desktop * Cloud Computing * Computer Weekly SearchCloudSecurity * The 8 best cloud security certifications for IT pros in 2022 Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security ... * How to overcome 3 multi-tenancy security issues Explore three major multi-tenancy security challenges and how to fix them, including lack of visibility, privilege overallocation... * Evaluate cloud database security controls, best practices If your company is using a cloud database provider, it's critical to stay on top of security. Review the security features ... SearchNetworking * Cisco's SD-WAN Version 17.8 supports OnRamp for more apps The newest version of Cisco's SD-WAN brings Cloud OnRamp support to NBAR applications like Slack or GitHub and custom apps and ... * An introduction to 8 types of network devices This introduction explores eight network devices that are commonly used within enterprise network infrastructures, including ... * Zero trust, wireless WAN affect the future of IoT networking Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in ... SearchCIO * SEC chair touts benefits of climate risk disclosure rule Interested parties are weighing in on the SEC's proposed climate risk disclosure rule, which is available for comment until May ... * Tech giants balk at competition bill, Digital Markets Act The EU has already reached an agreement on their Digital Markets Act, which would open tech giants' tightly controlled app stores... * DOD official asks for faster commercial technology adoption Michael Brown, director of the Defense Innovation Unit, said the lack of an effective approach to adopting commercial technology ... SearchEnterpriseDesktop * Microsoft responds to cloud antitrust complaints Microsoft has drawn antitrust scrutiny for rules that make it more expensive to run Windows and Office on rivals' clouds. The ... * Microsoft: Windows 11 features ease hybrid work strain on IT Microsoft has aimed its latest Windows 11 features at helping IT staff automate updates, secure corporate data and assist workers... * Understanding the features of Windows 11 Enterprise IT admins considering a migration to Windows 11 should learn how the features of the Enterprise edition can benefit their ... SearchCloudComputing * Key Amazon EKS monitoring best practices Learn how to monitor AWS EKS resources through tools such as CloudWatch and Prometheus, as well as worker node and infrastructure... * How cost and complexity factor into AWS DR strategies To choose the right AWS disaster recovery plan, understand how much downtime your business can tolerate -- and how DR scenarios ... * Use the AWS CLI to create an EC2 instance IT admins can use the AWS CLI to launch and manage EC2 instances. Follow these steps to learn how. ComputerWeekly.com * Zoom unveils platform innovations to elevate customer experience Breakout videoconferencing leader announces conversation intelligence service and enhances online events offering, with aim to ... * Cisco and Venywhere reimagine the future of hybrid work in Venice ‘living lab’ Cisco employees live and work remotely in Venice for three months as part of a pilot programme to help the city reinvent itself ... * Refugee support group works with tech startup on reporting system Computer Weekly speaks to a refugee support group about its ongoing collaboration with an academic tech startup to develop a ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Videos * Photo Stories * Definitions * Guides * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * CPE and CISSP Training * Reprints * Events * E-Products All Rights Reserved, Copyright 2000 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info Close