Command Injection Vulnerability in VMware Workspace ONE Access and Identity Manager
CVE-2020-4006

9.1CRITICAL

Summary

VMware Workspace ONE Access, Access Connector, Identity Manager, and Identity Manager Connector have a vulnerability that allows for command injection. This can potentially enable attackers to execute arbitrary commands on the affected system, leading to unauthorized access and manipulation of sensitive data. It is crucial for users to apply the necessary updates and patches to mitigate this security risk.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply updates per vendor instructions.

Affected Version(s)

VMware Workspace One Access (Access), VMware Workspace One Access Connector (Access Connector), VMware Identity Manager (vIDM), VMware Identity Manager Connector (vIDM Connector), VMware Cloud Foundation, vRealize Suite Lifecycle Manager Multiple

References

EPSS Score

55% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.