VMware released patches for vulnerabilities tracked as CVE-2021-22002 and CVE-2021-22003, impact Workspace One Access (Access), Identity Manager (vIDM), vRealize Automation (vRA), Cloud Foundation, and vRealize Suite Lifecycle Manager.

CVE-2021-22002 is related to VMware Workspace One Access and Identity Manager, which allows to the /cfg web app and diagnostic endpoints via port 443 by using a custom host header.

VMware Workspace One Access and Identity Manager, allow the /cfg web app and diagnostic endpoints, on port 8443, to be accessed via port 443 using a custom host header. VMware has evaluated this issue to be of ‘Important‘ severity with a maximum CVSSv3 base score of 8.6.

“A malicious actor with network access to port 443 could tamper with host headers to facilitate access to the /cfg web app, in addition a malicious actor could access /cfg diagnostic endpoints without authentication.”

CVE-2021-22003 flaw is an Information Disclosure Vulnerabilitythat resides in the VMware Workspace One Access and Identity Management.

Both solutions unintentionally provide a login interface on port 7443, an attacker could exploit the issue to enumerate the users or conduct brute force attack on the endpoint. 

“VMware Workspace One Access and Identity Manager, unintentionally provide a login interface on port 7443. VMware has evaluated this issue to be of ‘Low‘ severity with a maximum CVSSv3 base score of 3.7.” states the advisory. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account.”