VMware has released security updates to address three critical vulnerabilities impacting the Workspace ONE Assist product. Remote attackers can exploit the vulnerabilities to bypass authentication and elevate privileges to admin.
Workspace ONE Assist allows IT staff to remotely access and troubleshoot devices in real time from the Workspace ONE console.
The first issue, tracked as CVE-2022-31685 (CVSSv3 9.8/10), is an authentication bypass flaw, an attacker with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application.
The second issue, tracked as CVE-2022-31686 (CVSSv3 9.8/10), is a broken authentication method, an attacker with network access may be able to obtain administrative access without the need to authenticate to the application.
The third critical issue fixed by the virtualization giant is a broken authentication control tracked as CVE-2022-31687.
An attacker with network access may be able to obtain administrative access without the need to authenticate to the application.
The company addressed them with the release of Workspace ONE Assist 22.10 (89993) for Windows customers.
VMware also addressed two other issues, a reflected cross-site scripting (XSS) vulnerability tracked as CVE-2022-31688 (CVSSv3 score 6.4) and a session fixation vulnerability tracked as CVE-2022-31689 (CVSSv3 score 4.2).
The five issues were reported to VMware by Jasper Westerman, Jan van der Put, Yanick de Pater, and Harm Blankers of REQON IT-Security.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, VMware)
[adrotate banner=”5″]
[adrotate banner=”13″]