CVE-2022-22954

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on VMware Workspace ONE Access and Identity Manager systems through server-side template injection. Attackers with network access can exploit this to gain full control of affected systems. Organizations running vulnerable versions of these VMware products are affected.

💻 Affected Systems

Products:
  • VMware Workspace ONE Access
  • VMware Identity Manager
Versions: Workspace ONE Access: 21.08.0.1 and earlier, Identity Manager: 3.3.6 and earlier
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, lateral movement within the network, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated remote code execution allowing attackers to execute commands, steal credentials, and establish footholds in the network.

🟢

If Mitigated

Limited impact if systems are patched, network segmentation is in place, and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available. Actively exploited in the wild as confirmed by CISA.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Workspace ONE Access 21.08.0.2 or later, Identity Manager 3.3.7 or later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2022-0011.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from VMware's website. 2. Backup your system. 3. Apply the patch following VMware's documentation. 4. Restart the service/application. 5. Verify the patch was successful.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to vulnerable systems using firewall rules

Remove from Internet

all

Take vulnerable systems offline or move them behind VPN/restricted access

🧯 If You Can't Patch

  • Immediately isolate affected systems from the network
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check the version of VMware Workspace ONE Access or Identity Manager. If version is 21.08.0.1 or earlier for Access, or 3.3.6 or earlier for Identity Manager, the system is vulnerable.

Check Version:

Check the VMware product administration interface or consult product documentation for version information.

Verify Fix Applied:

Verify the version is updated to 21.08.0.2 or later for Workspace ONE Access, or 3.3.7 or later for Identity Manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual template processing errors
  • Suspicious HTTP requests to template endpoints
  • Unexpected system command execution

Network Indicators:

  • HTTP requests containing template injection payloads
  • Unusual outbound connections from the VMware server

SIEM Query:

source="vmware_logs" AND ("template" OR "freemarker") AND ("error" OR "exception")

🔗 References

📤 Share & Export