Critical VMware Workspace ONE Access CVE-2022-22954 flaw actively exploited

Threat actors are actively exploiting a critical vulnerability in VMware Workspace ONE Access and Identity Manager recently patched by the vendor.

Threat actors are actively exploiting a critical flaw, tracked as CVE-2022-22954, in VMware Workspace ONE Access and Identity Manager recently patched by the vendor. Researchers from cyber threat intelligence BadPackets also reported that the vulnerability is actively exploited in the wild.

CVE-2022-22954 event detected

Source IP:
178.176.202.121 ()

Target:
VMware Workspace ONE Access and Identity Manager servers vulnerable to remote code execution (https://t.co/Wz52bSpXpZ).#threatintel pic.twitter.com/vcio3i6F3h

— Bad Packets (@bad_packets) April 13, 2022

Last week, the virtualization giant has addressed multiple critical remote code vulnerabilities in several products, including VMware’s Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products. 

At the time, the company urged its customers to address the vulnerabilities immediately to prevent its exploitation.

The CVE-2022-22954 vulnerability is a server-side template injection remote code execution issue, it was rated 9.8 in severity.

“VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.” reads the security advisory. “A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.”

The company updated the advisory to confirm that the issue is exploited in the wild, users have to update their installs immediately.

“VMware has confirmed that exploitation of CVE-2022-22954 has occurred in the wild.” continues the advisory. “This critical vulnerability should be patched or mitigated immediately per the instructions in VMSA-2021-0011. The ramifications of this vulnerability are serious.”

Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: 
https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform  

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, WMware)

The post Critical VMware Workspace ONE Access CVE-2022-22954 flaw actively exploited appeared first on Security Affairs.

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt