
CVE-2022-22956 Scanner
CVE-2022-22956 Scanner - Authentication Bypass vulnerability in VMware Workspace ONE Access
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
20 days 7 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
VMware Workspace ONE Access is used by organizations worldwide for secure identity and access management. It allows employees to access enterprise applications and data from anywhere, enhancing work flexibility and productivity. Companies use it to ensure secure authentication and authorization processes for their digital resources. The software integrates with various identity providers and entitles users to access needed applications through a single login interface. It benefits enterprises by minimizing the footprint of unauthorized access and streamlining identity management processes. The solution is commonly used in industries with stringent security and compliance requirements, such as finance, healthcare, and government sectors.
The Authentication Bypass vulnerability in VMware Workspace ONE Access allows attackers to circumvent security controls. It exploits gaps in the OAuth2 ACS framework, leading to unauthorized privileges. Malicious entities can potentially access account details and sensitive data without proper authentication. This vulnerability can be detrimental, as bypassing authentication can lead to unauthorized access to critical systems and data breaches. The exploitation requires no user interaction, increasing the risk for organizations using affected versions. Due to its serious implications, this has been classified under critical security issues.
The vulnerability resides in the OAuth2 framework's exposed endpoints, which can be manipulated for unauthorized access. Attackers use the /SAAS/API/1.0/REST/oauth2 endpoints to generate activation tokens without restriction. They exploit the token generation process to align with legitimate authentication sessions, bypassing the need for credential verification. Upon gaining "client_id" and "client_secret," attackers can forge valid session tokens. The attack is accomplished by carefully constructing POST requests with the necessary parameters. The security flaw is significant due to its potential for enabling remote threats without needing direct access.
Exploiting this vulnerability risks compromising complete access control measures and sensitive data integrity. Attackers can execute operations typically restricted to authenticated users. System manipulation can follow, including altering configurations or deploying malicious software. Exposure to this flaw could lead to unauthorized data dumps or lateral movement across other networked systems. Organizations often face legal non-compliance risks post-breach, financial setbacks, and reputational damage. Heightened threat levels necessitate a swift response in applying necessary security mitigations.
REFERENCES
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/vmware_workspace_one_access_vmsa_2022_0011_chain.rb
- https://srcincite.io/blog/2022/08/11/i-am-whoever-i-say-i-am-infiltrating-vmware-workspace-one-access-using-a-0-click-exploit.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-22956
- http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html