Imechapishwa: Nov 26, 2020 12:57
Advisory No:
Source:
Software Affected:
Advisory No: TZCERT/SA/2020/11/26
Date of First Release: 26th November 2020
Source: VMware
Software Affected:
Overview:
The vulnerability exists in multiple VMware products that allow a malicious actor with network access to execute commands with unrestricted privileges.
Description:
The vulnerability is caused by failure to prevent privilege escalation when a malicious actor with network access and valid admin password of administrative configurator via port 8443 execute commands with unrestricted privileges on the underlying operating system.
Impact:
Successful exploitation of the vulnerability could allow an adversary to take control of the affected system.
Solution:
VMware has not released updates to address this vulnerability; however, the workaround has been released to fully remove the attack vector on the affected systems and prevent the exploitation. This workaround applies ONLY to VMware Workspace One Access, VMware Identity Manager, and VMware Identity Manager Connector.
Users of the affected systems are advised to implement the following workaround;
Implement Workaround for Linux-based appliances
cd /opt/vmware/horizon/workspace
mkdir webapps.tmp
mv webapps/cfg webapps.tmp
mv conf/Catalina/localhost/cfg.xml webapps.tmp
service horizon-workspace restart
Implement Workaround for Windows-based servers
net stop "VMwareIDMConnector"
cd \VMware\VMwareIdentityManager\Connector\opt\vmware\horizon\workspace
mkdir webappstmp
move webapps\cfg webappstmp
move conf\Catalina\localhost\cfg.xml webappstmp
net start "VMwareIDMConnector"
References:
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.