On November 8, 2022, VMware released Workspace ONE Assist 22.10 to patch three critical vulnerabilities that enabled remote actors to bypass authentication and elevate privileges to administrator. The flaws are tracked under the following CVEs:
- CVE-2022-31685 (authentication bypass)
- CVE-2022-31686 (broken authentication method)
- CVE-2022-31687 (broken authentication control)
On top of these three vulnerabilities, VMware also patched a reflected XSS vulnerability (CVE-2022-31688) and a session fixation vulnerability (CVE-2022-31689). The former of which would allow attackers to inject JavaScript code in the target user’s window and the latter of which allows authentication after obtaining a valid session token.
VMware Workspace ONE Assist is an application that allows remote control, screensharing, file system management, and remote command execution. The vulnerabilities were all found and reported by researchers at REQON IT-Security. These vulnerabilities follow similar vulnerabilities that were reported in multiple VMware products in August and May.