VMware Remote Access is getting three important fixes, so update now

Remote access tools are one of the most common ways cybercriminals can hack them endpoints (Opens in a new tab) And presenting malware, another popular service has now been affected.

VMware has released a significant update to its Workspace ONE Assist tool that fixed three critical flaws it says are now being exploited.

The disadvantages are security vulnerabilities related to elevation of privileges, allowing actors to threaten to bypass authentication and log into the application as administrators. It is tracked as CVE-2022-31685 (Authentication Bypass), CVE-202231686 (Disabled Authentication Method), and CVE-2022-31687 (Disabled Authentication Control). All of them have a severity score of 9.8.

Low complexity attacks

According to the company, hackers can abuse the flaws without any interaction from the victim. He described the potential attacks as “low complexity”.

“A malicious actor with network access to Workspace ONE Assist may be able to gain administrative access without having to authenticate to the application,” VMware said.

However, to stay safe from potential disaster, be sure to bring Workspace ONE Assist to version 22.10 (89993), if you’re a Windows user.

VMware’s cumulative update also fixes a number of other flaws, including CVE-2022-31688 (a cross-site scripting flaw) and CVE-2022-31689 (authentication after invalid session code error).

Often used by cybercriminals remote control (Opens in a new tab) Access the tools in their attacks, and combine them with phishing emails, malicious landing pages and fraudulent ads for maximum effect.

The most common type of attack starts with redirecting to a malicious landing page that warns the victim that his computer has been infected with viruses, and he needs urgent help from a professional. Such landing pages provide phone numbers that victims can call for ‘help’. Scammers on the other end of the line trick victims into downloading legitimate remote access software, and using it to take direct control of the target device.

Across: Computer (Opens in a new tab)

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version