VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2022-0011.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Jul 2024, 17:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-732 |
19 Apr 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Apr 2022, 16:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CPE | cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* cpe:2.3:a:vmware:workspace_one_access:21.08.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:workspace_one_access:20.10.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:workspace_one_access:20.10.0.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:* cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.vmware.com/security/advisories/VMSA-2022-0011.html - Patch, Vendor Advisory |
13 Apr 2022, 18:55
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-13 18:15
Updated : 2024-07-02 17:42
NVD link : CVE-2022-22960
Mitre link : CVE-2022-22960
CVE.ORG link : CVE-2022-22960
JSON object : View
Products Affected
vmware
- cloud_foundation
- workspace_one_access
- vrealize_automation
- vrealize_suite_lifecycle_manager
- identity_manager
linux
- linux_kernel
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource