Vulnerability Name:
CVE-2022-31658 (CCN-232595)
Assigned:
2022-08-02
Published:
2022-08-02
Updated:
2022-08-11
Summary:
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.
CVSS v3 Severity:
7.2 High
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
)
6.3 Medium
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
8.0 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
)
7.0 High
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
High
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
7.1 High
(CCN CVSS v2 Vector:
AV:N/AC:H/Au:S/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-74
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2022-31658
Source: XF
Type: UNKNOWN
vmware-cve202231658-code-exec(232595)
Source: CCN
Type: VMware Security Advisory VMSA-2022-0021
VMware Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector and vRealize Automation updates address multiple vulnerabilities.
Source: MISC
Type: Patch, Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2022-0021.html
Vulnerable Configuration:
Configuration 1
:
cpe:/a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:one_access:21.08.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:one_access:21.08.0.0:*:*:*:*:*:*:*
AND
cpe:/o:linux:linux_kernel:-:*:*:*:*:*:*:*
Configuration 2
:
cpe:/a:vmware:identity_manager_connector:3.3.4:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager_connector:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager_connector:3.3.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager_connector:19.03.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:access_connector:21.08.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:access_connector:21.08.0.0:*:*:*:*:*:*:*
OR
cpe:/a:vmware:access_connector:22.05:*:*:*:*:*:*:*
AND
cpe:/o:microsoft:windows:-:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:workspace_one_access:21.08.0.0:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
vmware
identity manager 3.3.4
vmware
identity manager 3.3.5
vmware
identity manager 3.3.6
vmware
one access 21.08.0.1
vmware
one access 21.08.0.0
linux
linux kernel -
vmware
identity manager connector 3.3.4
vmware
identity manager connector 3.3.5
vmware
identity manager connector 3.3.6
vmware
identity manager connector 19.03.0.1
vmware
access connector 21.08.0.1
vmware
access connector 21.08.0.0
vmware
access connector 22.05
microsoft
windows -
vmware
vrealize automation 7.6
vmware
workspace one access 21.08.0.1
vmware
workspace one access 21.08.0.0
vmware
identity manager 3.3.6
vmware
identity manager 3.3.5
vmware
identity manager 3.3.4