A VMware exploit is now available online which affects Workspace ONE Access, VMWare Identity Manager, and vRealize automation. The exploit has been given a CVE number of 2022-22972.
The exploit allows the attacker to bypass authentication and gain administrator permissions to the applications stated above. Attackers commonly target healthcare, education industry, and government organizations. Previous exploits were patched by VMware where attackers installed coin miners and backdoors into the network.
VMWare recommends patching their applications to the newest release. If you are unable to update, they recommend disabling all users except one provisioned administrator. Network applications should always be kept up to date. It’s a good idea to schedule updates regularly to patch even the smallest vulnerabilities.
Reference this article for the latest updates on this issue posted by VMWare: https://www.vmware.com/security/advisories/VMSA-2022-0014.html
Reference this article for additional updates: https://www.bleepingcomputer.com/news/security/exploit-released-for-critical-vmware-auth-bypass-bug-patch-now/
Beringer Technology Group is always here to provide expert knowledge in topics like these. We hope you found this information about this recent exploit helpful! If you have any other questions, contact us today to learn about our cyber security services and more!
Beringer Technology Group, a leading Microsoft Gold Certified Partner specializing in Microsoft Dynamics 365 and CRM for Distribution. We also provide expert Managed IT Services, Backup and Disaster Recovery, Cloud Based Computing and Unified Communication Solutions.