CISA Urges VMware Admins to Patch Critical Flaw in Workspace ONE UEM
CISA has asked VMware admins and users today to patch a critical security vulnerability found in the Workspace ONE UEM console that threat actors could abuse to gain access to sensitive information.
Workspace ONE Unified Endpoint Management (ONE UEM) is a VMware solution for over-the-air remote management of desktops, mobile, rugged, wearables, and IoT devices.
The flaw tracked as CVE-2021-22054 is a server side request forgery (SSRF) vulnerability with a severity rating of 9.1/10 and impacting multiple ONE UEM console versions.
Unauthenticated threat actors can exploit this vulnerability remotely in low-complexity attacks without user interaction.
“A malicious actor with network access to UEM can send their requests without authentication and may exploit this issue to gain access to sensitive information,” VMware explained in a security advisory issued on Thursday.
“CISA encourages users and administrators to review VMware Security Advisory VMSA-2021-0029 and apply the necessary mitigation,” CISA said today.
|Impacted Version||Fixed Version|
|2109||Workspace ONE UEM patch 184.108.40.206 and above|
|2105||Workspace ONE UEM patch 220.127.116.11 and above|
|2102||Workspace ONE UEM patch 18.104.22.168 and above|
|2101||Workspace ONE UEM patch 22.214.171.124 and above|
|2011||Workspace ONE UEM patch 126.96.36.199 and above|
|2010||Workspace ONE UEM patch 188.8.131.52 and above|
|2008||Workspace ONE UEM patch 184.108.40.206 and above|
|2007||Workspace ONE UEM patch 220.127.116.11 and above|
VMware also provides short-term mitigation to block exploitation attempts if you cannot immediately deploy one of the patched versions in the above table.
The temporary workaround requires you to edit the UEM web.config file by following the steps outlined here and restarting all server instances on which this workaround has been applied.
VMware also provides steps to validate that the workaround will successfully block attacks using CVE-2021-22054 exploits.
Also Read: When to Appoint a Data Protection Officer
To test if the workaround was correctly applied, you have to open a web browser and navigate to these URLs (you should only get 404 Not Found responses):
https://[UEM Console URL]/airwatch/blobhandler.ashx?url=test https://[UEM Console URL]/catalog/blobhandler.ashx?url=test https://[UEM Console URL]/airwatch/blobhandler.ashx?param1=test&url=test https://[UEM Console URL]/catalog/blobhandler.ashx?param1=test&url=test
“IIS reset will cause logged-in administrators to the server instance being patched to log out. Administrators should be able to log back in shortly after,” VMware says.