Security News > 2021 > December > CISA urges VMware admins to patch critical flaw in Workspace ONE UEM

CISA urges VMware admins to patch critical flaw in Workspace ONE UEM
2021-12-17 18:32

CISA has asked VMware admins and users today to patch a critical security vulnerability found in the Workspace ONE UEM console that threat actors could abuse to gain access to sensitive information.

Workspace ONE Unified Endpoint Management is a VMware solution for over-the-air remote management of desktops, mobile, rugged, wearables, and IoT devices.

The flaw tracked as CVE-2021-22054 is a server side request forgery vulnerability with a severity rating of 9.1/10 and impacting multiple ONE UEM console versions.

"A malicious actor with network access to UEM can send their requests without authentication and may exploit this issue to gain access to sensitive information," VMware explained in a security advisory issued on Thursday.

"CISA encourages users and administrators to review VMware Security Advisory VMSA-2021-0029 and apply the necessary mitigation," CISA said today.

"IIS reset will cause logged-in administrators to the server instance being patched to log out. Administrators should be able to log back in shortly after," VMware says.


News URL

https://www.bleepingcomputer.com/news/security/cisa-urges-vmware-admins-to-patch-critical-flaw-in-workspace-one-uem/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-12-17 CVE-2021-22054 Server-Side Request Forgery (SSRF) vulnerability in VMWare Workspace ONE UEM Console
VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability.
network
low complexity
vmware CWE-918
7.5

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Vmware 146 11 222 256 102 591