Critical VMware Vulnerability: VMSA-2022-0014

This post is being published to spread awareness of VMSA-2022-0014 and provide an overview of what products are impacted, and where to seek additional information.

What is it?

VMSA-2022-0014 is a security advisory from VMware due to authentication bypass and privilege escalation vulnerabilities.

The authentication bypass means that a malicious actor with network access, could gain administrative access to the system.

The privilege escalation enables the ability to get root access if local access is achieved.

What products are impacted?

Multiple VMware products are directly impacted, these are:

  • Workspace ONE Access
  • VMware Identity Manager
  • vRealize Lifecycle Manager
  • vRealize Automation
  • VMware Cloud Foundation

However, VMware Identity Manager can be used as an optional components for addifional VMware products, expanding the threat to include the following:

  • NSX
  • vRealize Operations
  • vRealize Log Insight
  • vRealize Network Insight

Additional Comments:

VMware are keeping articles up to date on this and I’ll share the articles below rather than supplying dated information, but I want to call out a few specific pieces:

You may be thinking “I’m sure I patched recently, I’m fine!”, please double check. There was a VMSA-2022-0011 security patch in April, this doesn’t contain the required fixed for these vulnerabilities. However VMSA-2022-0014 includes the fixes for VMSA-2022-0011.

If you’re using Dell EMC VxRail or HPE SimpliVity, remember these patches haven’t necessarily been tested for such integrated solutions, it’s best to speak to your vendor if you have a supplemental management layer such as this.

Additional Links:

VMware are maintaining a full FAQ here: https://core.vmware.com/vmsa-2022-0014-questions-answers-faq

VMware are providing full CVE information including KB links to patches here: https://www.vmware.com/security/advisories/VMSA-2022-0014.html

By micoolpaul

Data Protection Consultant, focusing on Veeam, VMware & Microsoft Productivity and Infrastructure stacks.

Leave a comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: