CVE-2021-22056

7.5 HIGH

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in VMware Workspace ONE Access and Identity Manager products. It allows attackers with network access to make HTTP requests to arbitrary internal or external systems and read the full responses. Organizations running affected versions of these VMware products are vulnerable.

💻 Affected Systems

Products:
  • VMware Workspace ONE Access
  • VMware Identity Manager
Versions: Workspace ONE Access: 21.08, 20.10.0.1, 20.10; Identity Manager: 3.3.5, 3.3.4, 3.3.3
Operating Systems: All supported platforms for these products
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network access to the vulnerable system. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal services, retrieve credentials from metadata services, perform internal port scanning, or pivot to other systems in the network.

🟠

Likely Case

Information disclosure from internal services, potential credential harvesting from cloud metadata endpoints, or reconnaissance of internal network services.

🟢

If Mitigated

Limited to information disclosure from services accessible to the vulnerable system, with no direct code execution or authentication bypass.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tools exist for automated exploitation. The unauthenticated nature makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Workspace ONE Access 21.08.0.1 and later; Identity Manager 3.3.6 and later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0030.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from VMware's download portal. 2. Apply the patch following VMware's documentation. 3. Restart the affected services. 4. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to vulnerable systems using firewalls or network segmentation.

Web Application Firewall

all

Deploy a WAF with SSRF protection rules to block malicious requests.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from sensitive internal services
  • Deploy a web application firewall with SSRF protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check the product version in the administration console or via the web interface. Compare against affected versions listed in the advisory.

Check Version:

Check via product web interface or administration console. No single command applies to all deployment scenarios.

Verify Fix Applied:

Verify the installed version is patched (Workspace ONE Access >= 21.08.0.1, Identity Manager >= 3.3.6) and test SSRF functionality is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the vulnerable system
  • Requests to internal IP addresses or metadata services
  • Multiple failed HTTP requests to non-standard ports

Network Indicators:

  • HTTP traffic from vulnerable system to internal services it shouldn't access
  • Requests to cloud metadata endpoints (169.254.169.254, etc.)

SIEM Query:

source_ip=[vulnerable_system_ip] AND (dest_ip=169.254.169.254 OR dest_port NOT IN (80,443) OR dest_ip IN (internal_ranges))

🔗 References

📤 Share & Export