Security

Patches

VMware warns of three critical holes in remote-control tool

Anyone can pretend to be your Windows IT support and take command of staff devices


VMware has revealed a terrible trio of critical-rated flaws in Workspace ONE Assist for Windows – a product used by IT and help desk staff to remotely take over and manage employees' devices.

The flaws are all rated 9.8 out of 10 in CVSS severity. A miscreant able to reach a Workspace ONE Assist deployment, either over the internet or on the network, can exploit any of these three bugs to obtain administrative access without the need to authenticate. At which point the intruder or rogue insider can contact users to offer them assistance that is anything but helpful, such as seizing control of devices.

It's all possible because Workspace ONE Assist's authentication code appears to be – let's not sugar coat this – borked.

We make that assertion because one of the flaws (CVE-2022-31685) allows an attacker to bypass authentication. CVE-2022-31686 is described as a "broken authentication method," and a broken access control is the problem detailed in CVE-2022-31687.

But wait, there's more! Workspace ONE Assist is also afflicted with a 6.4-rated cross-site scripting vulnerability (CVE-2022-31688) that – thanks to improper user input sanitization – can be exploited, with some user interaction, to inject and run malicious JavaScript code in the victim's window.

There's also CVE-2022-31689 to worry about – a 4.2-rated vuln that enables a malicious actor who obtains a valid session token to authenticate to the application using that token.

These flaws apply to versions 21.x and 22.x of Workspace ONE Assist. Version 21.x appears to have debuted in early 2021, while the 22.x series emerged in March 2022.

Version 22.10 clears up all of the above messes, adds a few features, and tidies up some other issues. It's yours for the downloading here.

VMware hat-tipped Jasper Westerman, Jan van der Put, Yanick de Pater, and Harm Blankers of REQON IT-Security for discovering and reporting the security weaknesses.

In happier news for Virtzilla, the company has announced that its cloudy wares are now available through HPE's GreenLake ITaaS platform, plus – irony alert – a "more secure" version of its Anywhere Workspace hybrid work suite. ®

Send us news
Post a comment

Broadcom halves subscription price for VMware's flagship hybrid cloud suite

Also kills perpetual licenses, adds a vSphere bundle for smaller users

Broadcom to divest VMware's end-user computing and Carbon Black units

Warns of $1.3 billion charge for cutting Virtzilla's costs, rapid shift to subs and sales of the whole vStack rather than individual pieces

VMware president Sumit Dhawan out – scores gig as CEO of infosec vendor Proofpoint

Amid accounts of wider layoffs and Broadcom doing a 'strategic review' of end-user compute and Carbon Black products

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Cisco intros AI to find firewall flaws, warns this sort of thing can't be free

Predicts cyber crims will find binary brainboxes harder to battle

Uncle Sam probes cyberattack on Pennsylvania water system by suspected Iranian crew

CISA calls for stronger IT defenses as Texas district also hit by ransomware crew

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

Polish train maker denies claims its software bricked rolling stock maintained by competitor

Says it was probably hacked, which isn't good news either

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

US warns Iranian terrorist crew broke into 'multiple' US water facilities

There's a war on and critical infrastructure operators are still using default passwords