Remote Code Execution Vulnerability in VMware Workspace ONE Access and vRealize Automation
CVE-2022-22957

7.2HIGH

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

Summary

VMware Workspace ONE Access, Identity Manager, and vRealize Automation are susceptible to remote code execution due to improper deserialization of untrusted data. An attacker with administrative privileges can exploit this vulnerability by sending a carefully crafted JDBC URI, leading to potentially harmful outcomes including unauthorized remote code execution on the affected systems.

Affected Version(s)

VMware Workspace ONE Access, Identity Manager and vRealize Automation. Access 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0. Identity Manager 3.3.6, 3.3.5, 3.3.4, 3.3.3. vRealize Automation 7.6.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.