VMware Releases Patches for A number of New Flaws Affecting A number of Merchandise

[ad_1]

Virtualization companies supplier VMware on Tuesday shipped updates to handle 10 safety flaws affecting a number of merchandise that could possibly be abused by unauthenticated attackers to carry out malicious actions.

The problems, tracked from CVE-2022-31656 via CVE-2022-31665 (CVSS scores: 4.7 – 9.8), impression VMware Workspace ONE Entry, Workspace ONE Entry Connector, Identification Supervisor, Identification Supervisor Connector, vRealize Automation, Cloud Basis, and vRealize Suite Lifecycle Supervisor.

CyberSecurity

Probably the most extreme of the failings is CVE-2022-31656 (CVSS rating: 9.8), an authentication bypass vulnerability affecting native area customers that could possibly be leveraged by a foul actor with community entry to acquire administrative rights.

Additionally resolved by VMware are three distant code execution vulnerabilities (CVE-2022-31658, CVE-2022-31659, and CVE-2022-31665) associated to JDBC and SQL injection that could possibly be weaponized by an adversary with administrator and community entry.

VMware

Elsewhere, it has additionally remediated a mirrored cross-site scripting (XSS) vulnerability (CVE-2022-31663) that it stated is a results of improper person sanitization, which might result in the activation of malicious JavaScript code.

Rounding off the patches are three native privilege escalation bugs (CVE-2022-31660, CVE-2022-31661, and CVE-2022-31664) that let an actor with native entry to escalate privileges to “root,” a URL injection vulnerability (CVE-2022-31657), and a path traversal bug (CVE-2022-31662).

CyberSecurity

Whereas profitable exploitation of CVE-2022-31657 makes it attainable to redirect an authenticated person to an arbitrary area, CVE-2022-31662 might equip an attacker to learn recordsdata in an unauthorized method.

VMware stated it is not conscious of the exploitation of those vulnerabilities within the wild, however urged prospects utilizing the weak merchandise to apply the patches instantly to mitigate potential threats.



[ad_2]

Leave a Reply