VMware fixes critical SSRF flaw in Workspace ONE UEM Console

VMware released security patches for a critical server-side request forgery (SSRF) vulnerability in Workspace ONE UEM console.

VMware has addressed a critical server-side request forgery (SSRF) vulnerability, tracked as CVE-2021-22054, in the Workspace ONE UEM console.

An attacker with network access to UEM could exploit the vulnerability to access sensitive data in the management console. An attacker can trigger the issue by sending unauthenticated requests to the vulnerable software.

“VMware Workspace ONE UEM console contains a Server Side Request Forgery (SSRF) vulnerability. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.1.” reads the analysis published by VMware. “A malicious actor with network access to UEM can send their requests without authentication and may exploit this issue to gain access to sensitive information.”

Below is the list of impacted versions:

Impacted VersionsFixed Version2109Workspace ONE UEM patch 21.9.0.13 and above2105Workspace ONE UEM patch 21.5.0.37 and above2102Workspace ONE UEM patch 21.2.0.27 and above2101Workspace ONE UEM patch 21.1.0.27 and above2011Workspace ONE UEM patch 20.11.0.40 and above2010Workspace ONE UEM patch 20.10.0.23 and above2008Workspace ONE UEM patch 20.8.0.36 and above2007Workspace ONE UEM patch 20.7.0.17 and above

The virtualization giant has rated the issue as Critical and assigned it a CVSSv3 base score of 9.1. The SSRF vulnerability in Workspace ONE UEM console was privately reported to the company which released security patches and workarounds.

The company fixed the issue with the release of VMware Workspace ONE UEM console versions 21.5.0.37, 21.2.0.27, 20.11.0.40, and 20.0.8.36. VMware Workspace ONE UEM patch 21.9.0.13 and above also fixed the vulnerability.

The company also shared the following required actions in guidance for addressing CVE-2021-22054 (87167).

Shared and Dedicated SaaS: None. The issue has been mitigated across all SaaS environments through infrastructure changes which will remain in place until VMware Cloud Operations has deployed the necessary patches. Please subscribe to this article to be notified when updates are availableOn-premise: Deploy the patch associated with the supported version of Workspace ONE UEM that your environment is on. Alternatively, you may implement the short-term mitigation noted below

Follow me on Twitter: @securityaffairs and Facebook

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}
Pierluigi Paganini

(SecurityAffairs – hacking, VMware Workspace ONE UEM)

The post VMware fixes critical SSRF flaw in Workspace ONE UEM Console appeared first on Security Affairs.