VMware patches critical auth bypass flaw in multiple products

VMware warned customers today to immediately patch a critical authentication bypass vulnerability “Affecting local domain users” in multiple products that can be exploited to obtain admin privileges.

“This critical vulnerability should be patched or mitigated immediately per the instructions in VMSA-2021-0014,” VMware warned on Wednesday.

While VMware usually adds a note regarding active exploitation to most security advisories, VMware didn’t include such information in today’s VMSA-2022-0014 advisory.

“The only way to remove the vulnerabilities from your environment is to apply the patches provided in VMSA-2021-0014. Workarounds, while convenient, do not remove the vulnerabilities, and may introduce additional complexities that patching would not,” VMware added.

“While the decision to patch or use the workaround is yours, VMware always strongly recommends patching as the simplest and most reliable way to resolve this type of issue.”

In April, VMware patched another critical vulnerability, a remote code execution bug in VMware Workspace ONE Access and VMware Identity Manager.

Share this article on social media:

Subscribe to Our Newsletter!

Stay on top of cybersecurity risks, evolving threats and industry news.

This field is for validation purposes and should be left unchanged.

Recent News

Featured Services

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

BOOK A MEETING

Provide your contact details

This field is for validation purposes and should be left unchanged.

* Aucun fournisseur de courriel personnel permis (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.