Connect with us

Cyber Security

Researchers to release exploit for new VMware auth bypass, patch now

Published

on

Proof-of-concept exploit code is about to be published for a vulnerability that allows administrative access without authentication in several VMware products.

Identified as CVE-2022-22972, the security issue received a fix last Wednesday, accompanied by an urgent warning for administrators to install the patch or apply mitigations immediately.

PoC to be released

In an advisory on May 18th, VMware warned that the security implications for leaving CVE-2022-22972 unpatched are severe as the issue is “in the critical severity range with a maximum CVSSv3 base score of 9.8,” with 10 being the maximum.

The flaw affects VMware Workspace ONE Access, Identity Manager, and vRealize Automation,. The company warns that attackers with access to the appliance interface can use it to bypass authentication to reach local domain users.

Security researchers at attack surface assessment company Horizon3 announced today that they managed to create a working proof-of-concept (PoC) exploit code for CVE-2022-22972 and will be releasing a technical report shortly.

They have not released any technical details yet but the plan includes publishing exploit code that demonstrates the attack vector.

As a tease for what’s to come, Horizon3’s Attack Team published a screenshot showing that they gained access to a VMware Workspace ONE instance, although no user was signed in through the web login interface.

Researchers create exploit for VMware vulnerability CVE-2022-22972
source: Horizon3 Attack Team

VMware Workspace ONE allows companies to manage user devices and applications (personal or company-owned) by integrating them into a digital environment. The platform also provides access control to allow users to access corporate resources securely.

VMware recommends disabling all local users and administrators, leaving active only the provisioned users. However, this is only a workaround and it does not fully mitigate the risk of attackers exploiting CVE-2022-22972.

The severity of the vulnerability has been further highlighted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in an emergency directive published on the same day VMware released the fix for CVE-2022-22972.

At the moment there is no public information that threat actors are exploiting this security flaw. Nevertheless, threat actors have shown in the past that they are quick to take advantage of issues shortly after updates appeared, and even more so, when technical details are revealed.

A set of critical vulnerabilities that VMware patched in April started to be exploited in the wild just 48 hours after the company released an alert and the corresponding fixes, to install cryptocurrency miners and backdoors.

Horizon3 previously released exploit code for CVE-2022-1388 – a critical vulnerability that allows remote code execution in F5 BIG-IP networking devices. Just like with the upcoming exploit release for the VMware vulnerability, the researchers strongly recommended admins to patch their vulnerable F5 appliances.

Source: https://www.bleepingcomputer.com/news/security/researchers-to-release-exploit-for-new-vmware-auth-bypass-patch-now/

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2023 Cyber Reports Cyber Security News All Rights Reserved Website by Top Search SEO