VMware fixes critical SSRF flaw in Workspace ONE UEM Console

VMware released security patches for a critical server-side request forgery (SSRF) vulnerability in Workspace ONE UEM console.

VMware has addressed a critical server-side request forgery (SSRF) vulnerability, tracked as CVE-2021-22054, in the Workspace ONE UEM console.

An attacker with network access to UEM could exploit the vulnerability to access sensitive data in the management console. An attacker can trigger the issue by sending unauthenticated requests to the vulnerable software.

“VMware Workspace ONE UEM console contains a Server Side Request Forgery (SSRF) vulnerability. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.1.” reads the analysis published by VMware. “A malicious actor with network access to UEM can send their requests without authentication and may exploit this issue to gain access to sensitive information.”

Below is the list of impacted versions:

Impacted Versions Fixed Version
2109 Workspace ONE UEM patch 21.9.0.13 and above
2105 Workspace ONE UEM patch 21.5.0.37 and above
2102 Workspace ONE UEM patch 21.2.0.27 and above
2101 Workspace ONE UEM patch 21.1.0.27 and above
2011 Workspace ONE UEM patch 20.11.0.40 and above
2010 Workspace ONE UEM patch 20.10.0.23 and above
2008 Workspace ONE UEM patch 20.8.0.36 and above
2007 Workspace ONE UEM patch 20.7.0.17 and above

The virtualization giant has rated the issue as Critical and assigned it a CVSSv3 base score of 9.1. The SSRF vulnerability in Workspace ONE UEM console was privately reported to the company which released security patches and workarounds.

The company fixed the issue with the release of VMware Workspace ONE UEM console versions 21.5.0.37, 21.2.0.27, 20.11.0.40, and 20.0.8.36. VMware Workspace ONE UEM patch 21.9.0.13 and above also fixed the vulnerability.

The company also shared the following required actions in guidance for addressing CVE-2021-22054 (87167).

Shared and Dedicated SaaS: None. The issue has been mitigated across all SaaS environments through infrastructure changes which will remain in place until VMware Cloud Operations has deployed the necessary patches. Please subscribe to this article to be notified when updates are available
On-premise: Deploy the patch associated with the supported version of Workspace ONE UEM that your environment is on. Alternatively, you may implement the short-term mitigation noted below

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, VMware Workspace ONE UEM)

The post VMware fixes critical SSRF flaw in Workspace ONE UEM Console appeared first on Security Affairs.

If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.

Discord

Original Source