Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-31656

Severity
9.8CRITICAL
EPSS
80.5%
top 0.87%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 5
Latest updateAug 10

Description

VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDvmware/one_access21.08.0.0, 21.08.0.1+1
NVDvmware/access_connector21.08.0.0, 21.08.0.1, 22.05+2
NVDvmware/identity_manager3.3.4, 3.3.5, 3.3.6+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hvqf-whpm-54wr: VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users2022-08-06
CVEList
CVE-2022-31656: VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users2022-08-05
VulnCheck
VMware Workspace ONE Access, Identity Manager and vRealize Automation Authentication Bypass2022

💥Exploits & PoCs

1
Nuclei
VMware - Local File Inclusion

🔍Detection Rules

1
Suricata
ET EXPLOIT Attempted VMware Authentication Bypass (CVE-2022-31656)2022-08-10

📋Vendor Advisories

1
VMware
VMware Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector and vRealize Automation updates address multiple vulnerabilities.2022-08-02