Vulnerability Name:
CVE-2022-31660 (CCN-232593)
Assigned:
2022-08-01
Published:
2022-08-01
Updated:
2022-08-11
Summary:
VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.
CVSS v3 Severity:
7.8 High
(CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
)
7.2 High
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
7.8 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
)
7.2 High
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
6.8 Medium
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-269
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2022-31660
Source: XF
Type: UNKNOWN
vmware-cve202231660-priv-esc(232593)
Source: CCN
Type: Packet Storm Security [08-04-2022]
VMware Workspace ONE Access Privilege Escalation
Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [08-22-2022]
VMware Workspace ONE Access CVE-2022-31660
Source: CCN
Type: VMware Security Advisory VMSA-2022-0021
VMware Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector and vRealize Automation updates address multiple vulnerabilities.
Source: MISC
Type: Patch, Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2022-0021.html
Vulnerable Configuration:
Configuration 1
:
cpe:/a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:one_access:21.08.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:one_access:21.08.0.0:*:*:*:*:*:*:*
AND
cpe:/o:linux:linux_kernel:-:*:*:*:*:*:*:*
Configuration 2
:
cpe:/a:vmware:identity_manager_connector:3.3.4:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager_connector:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager_connector:3.3.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager_connector:19.03.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:access_connector:21.08.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:access_connector:21.08.0.0:*:*:*:*:*:*:*
OR
cpe:/a:vmware:access_connector:22.05:*:*:*:*:*:*:*
AND
cpe:/o:microsoft:windows:-:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*
OR
cpe:/a:vmware:workspace_one_access:21.08.0.0:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
vmware
identity manager 3.3.4
vmware
identity manager 3.3.5
vmware
identity manager 3.3.6
vmware
one access 21.08.0.1
vmware
one access 21.08.0.0
linux
linux kernel -
vmware
identity manager connector 3.3.4
vmware
identity manager connector 3.3.5
vmware
identity manager connector 3.3.6
vmware
identity manager connector 19.03.0.1
vmware
access connector 21.08.0.1
vmware
access connector 21.08.0.0
vmware
access connector 22.05
microsoft
windows -
vmware
vrealize automation 7.6
vmware
workspace one access 21.08.0.1
vmware
workspace one access 21.08.0.0
vmware
identity manager 3.3.6
vmware
identity manager 3.3.5
vmware
identity manager 3.3.4