Cybersecurity News

VMware patches critical auth bypass flaw in multiple products

VMware warned customers today to immediately patch a critical authentication bypass vulnerability “Affecting local domain users” in multiple products that can be exploited to obtain admin privileges.

“This critical vulnerability should be patched or mitigated immediately per the instructions in VMSA-2021-0014,” VMware warned on Wednesday.

While VMware usually adds a note regarding active exploitation to most security advisories, VMware didn’t include such information in today’s VMSA-2022-0014 advisory.

“The only way to remove the vulnerabilities from your environment is to apply the patches provided in VMSA-2021-0014. Workarounds, while convenient, do not remove the vulnerabilities, and may introduce additional complexities that patching would not,” VMware added.

“While the decision to patch or use the workaround is yours, VMware always strongly recommends patching as the simplest and most reliable way to resolve this type of issue.”

In April, VMware patched another critical vulnerability, a remote code execution bug in VMware Workspace ONE Access and VMware Identity Manager.

Stay on Top of Cyber Threats!
Subscribe to our monthly bulletin to stay updated on major cybersecurity risks.

Recent Cybersecurity News

Tell us about your needs.
Get an answer the same business day.

Tell us about your needs.
Get an answer the same business day.

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

What happens next:

  • We reach out to learn about your objectives
  • We work together to define your project's scope
  • You get an all-inclusive, no engagement proposal

No engagement. We answer within 24h.
Scroll to Top

BOOK A MEETING WITH AN EXPERT

Enter Your Corporate Email