CVE-2022-22960

7.8 HIGH

📋 TL;DR

This vulnerability allows a malicious actor with local access to VMware Workspace ONE Access, Identity Manager, or vRealize Automation systems to escalate privileges to root due to improper permissions in support scripts. Organizations using affected versions of these VMware products are at risk of complete system compromise.

💻 Affected Systems

Products:
  • VMware Workspace ONE Access
  • VMware Identity Manager
  • VMware vRealize Automation
Versions: Multiple versions prior to patches released in 2022
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system; not exploitable remotely without additional vulnerabilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root access, enabling installation of persistent backdoors, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Privilege escalation to root by an attacker with initial access, leading to credential harvesting, configuration changes, and further exploitation.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place to detect and contain local privilege escalation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access; multiple public exploit scripts and technical details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to VMware advisory VMSA-2022-0011 for specific patched versions

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2022-0011.html

Restart Required: Yes

Instructions:

1. Review VMware advisory VMSA-2022-0011. 2. Identify affected products and versions. 3. Apply the appropriate patches from VMware. 4. Restart affected services/systems as required.

🔧 Temporary Workarounds

Remove unnecessary local access

linux

Restrict local access to affected systems to only authorized administrators

Review and tighten local user accounts and SSH access

Review and secure support scripts

linux

Audit and modify permissions on support scripts to prevent unauthorized execution

chmod 750 /path/to/support/scripts
chown root:root /path/to/support/scripts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Enforce least privilege access controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if running affected VMware product versions listed in VMSA-2022-0011

Check Version:

Check product-specific version commands (e.g., for vRealize Automation: vracli version)

Verify Fix Applied:

Verify patch installation and check that support script permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Execution of support scripts by non-root users
  • Changes to system permissions

Network Indicators:

  • Unusual outbound connections from affected systems post-exploitation

SIEM Query:

source="vmware_logs" AND (event_type="privilege_escalation" OR process_name="support_script")

🔗 References

📤 Share & Export