VMware has released security updates to patch eight vulnerabilities spanning its products, some of which could be exploited to launch remote code execution attacks.
Tracked from CVE-2022-22954 to CVE-2022-22961 (CVSS scores: 5.3 - 9.8), the issues impact VMware Workspace ONE Access, VMware Identity Manager, VMware vRealize Automation, VMware Cloud Foundation, and vRealize Suite Lifecycle Manager.
Five of the eight bugs are rated Critical, two are rated Important, and one is rated Moderate in severity. Credited with reporting all the vulnerabilities is Steven Seeley of Qihoo 360 Vulnerability Research Institute.
The list of flaws is below -
Successful exploitation of the aforementioned weaknesses could allow a malicious actor to escalate privileges to root user, gain access to the hostnames of the target systems, and remotely execute arbitrary code, effectively allowing full takeover.
βThis critical vulnerability should be patched or mitigated immediately,β VMware said in an alert. βThe ramifications of this vulnerability are serious.β
While the virtualization services provider noted that it has not seen any evidence that the vulnerabilities have been exploited in the wild, itβs highly recommended to apply the patches to remove potential threats.
βWorkarounds, while convenient, do not remove the vulnerabilities, and may introduce additional complexities that patching would not,β the company cautioned.
Found this article interesting? Follow THN on Facebook, Twitter ο and LinkedIn to read more exclusive content we post.