SUBJECT: VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector Command Injection Vulnerability (CVE-2020-4006)
TECH STACK: VMware Workspace One Access, Access Connector, Identity Manager, Identity Manager Connector
DATE(S) ISSUED: 11/23/2020
NVD Last Modified: 07/21/2021
CRITICALITY: CRITICAL (Base Score 9.1)
OVERVIEW:
A command injection vulnerability in the administrative configuration of VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector could allow a malicious actor to execute commands with unrestricted privileges on the underlying operating system.
SOLUTION/MITIGATION:
-
- Identify affected versions of VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector based on your environment.
- Download and apply the appropriate security patches as outlined in the VMware Security Advisory
- Follow the specific deployment instructions provided by VMware for each product.
- Prioritize patching critical systems first.
-
- Immediately change the default password for the configurator admin account on all affected systems.
- Use a strong password that meets complexity requirements and is not used for any other accounts.
- Consider enabling multi-factor authentication (MFA) for additional security.
- Disable Unused Functionality:
-
- If you don't use specific features or services within the affected products, disable them to reduce the attack surface.
-
- If possible, segment your network to isolate affected systems from critical resources and limit potential lateral movement in case of an exploit.
ONGOING MITIGATION:
-
- Regularly scan your environment for vulnerabilities, including newly discovered ones, and prioritize patching accordingly.
- Consider using automated vulnerability scanning tools to streamline this process.
- Security Awareness Training:
- Educate users on the risks of social engineering and phishing attacks that could be used to exploit this vulnerability.
- Emphasize the importance of not clicking on suspicious links or opening attachments from unknown senders.
-
- Implement the principle of least privilege, granting users only the minimum access permissions they need to perform their tasks.
- Regularly review and adjust access controls as needed.
-
- Enable logging for the administrative configurator and monitor logs for suspicious activity.
- Investigate any unusual events promptly.
-
- Subscribe to security advisories from VMware and other relevant sources to stay updated on the latest vulnerabilities and mitigation strategies.
ADDITIONAL NOTES:
- The provided mitigation steps are general recommendations. You may need to adapt them based on your specific deployment and security posture.