• These critical VMware security flaws must be patched now

    From TechnologyDaily@1337:1/100 to All on Wed Aug 3 17:00:04 2022
    These critical VMware security flaws must be patched now

    Date:
    Wed, 03 Aug 2022 15:30:49 +0000

    Description:
    VMware fixes an escalation of privilege flaw found in a number of its products, and urges admins to patch immediately.

    FULL STORY ======================================================================

    VMware has released a patch for a high-severity flaw affecting a number of
    its products and given the destructive power it holds, users are urged to patch their endpoints immediately.

    The company recently published a security advisory in which it says it
    patched a total of ten vulnerabilities, including CVE-2022-31656, a flaw with a severity score of 9.8. This flaw, the company explained, is found in VMware's Workspace ONE Access, Identity Manager, and vRealize Automation.

    Describing the flaw, VMware said: A malicious actor with network access to
    the UI may be able to obtain administrative access without the need to authenticate." In other words, the attacker can use the flaw to get admin privileges - remotely. Proof-of-concept in the works

    At the moment, theres no evidence of the flaw being exploited in the wild, VMware said. Still, it urged its users not to wait for someone to get hurt before applying the patch: "It is extremely important that you quickly take steps to patch or mitigate these issues in on-premises deployments," VMware says. "If your organization uses ITIL methodologies for change management, this would be considered an 'emergency' change."

    We might not have an in-the-wild example, but a proof-of-concept is in the works. Petrus Viet, the researcher who first discovered the flaw, announced hes working on a proof-of-concept exploit, reports The Register . Read more

    VMware claims 'bare-metal' performance on virtualized GPUs


    Multiple VMware products found to contain critical security flaws


    These are the best patch management solutions right now

    Others chimed in on the issue, including senior research engineer for
    Tenables security response team, Claire Tills. For her, the flaw could also
    be used to exploit other bugs VMware recently disclosed. "It is crucial to note that the authentication bypass achieved with CVE-2022-31656 would allow attackers to exploit the authenticated remote code execution flaws addressed in this release," she said, referring to CVE-2022-31658, and CVE-2022-31659, which carry a severity score of 8.0.

    The Register also spotted that the flaw was similar to CVE-2022-22972, also an authentication bypass vulnerability (9.8) that VMware patched in May. That one prompted CISA to ask US government agencies to stop using VMware products until the problem is fixed. Here's our list of the best firewalls right now

    Via: The Register



    ======================================================================
    Link to news story: https://www.techradar.com/news/these-critical-vmware-security-flaws-must-be-pa tched-now/


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)