News

VMware patches 0-day vulnerability discovered by NSA

At the end of November, VMware announced a 0-day vulnerability CVE-2020-4006 in its products, which discovered NSA specialists.

Firstly, the company’s specialists talked about temporary ways to protect againts the bug, and at the end of last week they finally released fixes.

By the way, we talked about how VMWare EXSi was hacked during the Tianfu Cup hacker competition in China.

The issue affects endpoint and identity management solutions that are often used in corporate and government networks. So, the bug affected:

  • VMware Workspace ONE Access Connector (Access Connector);
  • VMware Workspace ONE Access (Access) 20.01 и 10 на Linux;
  • VMware Identity Manager (vIDM) 3.3.1, 3.3.2, 3.3.3 на Linux;
  • VMware Identity Manager Connector (vIDM Connector) 3.3.1, 3.3.2, 3.3.3, 19.03
  • VMware Cloud Foundation 4.x;
  • vRealize Suite Lifecycle Manager 8.x.

After the patches have been released, NSA experts have issued their own CVE-2020-4006 warning, urging government agencies to urgently deploy fixes due to ongoing attacks from Russian hackers.

Essentially, CVE-2020-4006 is a command injection vulnerability that allows attackers to execute arbitrary commands at the OS level. Moreover, the bug can be used only if the attacker has previously been authenticated in the WorkspaceONE control panel. If this happens, the vulnerability could be exploited to gain full control over any unsecured VMWare Workspace ONE system.

“There are already known cases of Russian government hackers obtaining credentials from the VMWare Workspace ONE dashboard and then using the latest bug in their attacks to move laterally within networks and escalate access”, – said representatives of the NSA.

The hackers reportedly installed a web shell on VMWare Workspace ONE and then generated SAML credentials for themselves. They then used those credentials to access and steal sensitive data from the Microsoft ADFS servers, belonging to the victim company’s.

The NSA does not disclose the names of the hack groups that are already exploiting the bug, but warns organizations not to take the issue light-headedly.

Let me also remind you that FBI and NSA discovered Drovorub malware, created by Russian Intelligence services.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Qehu Virus Removal Guide (+Decrypt .qehu files)

Qehu - General Info Qehu is a destructive software functioning as typical ransomware. Michael Gillespie,…

10 hours ago

Qepi Virus Removal Guide (+Decrypt .qepi files)

Qepi Virus - Details Qepi is a destructive software functioning as typical ransomware. Michael Gillespie,…

10 hours ago

Remove Wifebaabuy.live pop-up ads (Virus Removal Guide)

Wifebaabuy.live is a domain that tries to trick you into clik to its browser notifications…

11 hours ago

Remove Relativeads.net pop-up ads (Virus Removal Guide)

Relativeads.net is a domain that tries to force you into clik to its browser notifications…

12 hours ago

Remove Vamtoa pop-up ads (Virus Removal Guide)

Vamtoacm.com is a domain that tries to force you into clik to its browser notifications…

12 hours ago

Remove Clicks2apk pop-up ads (Virus Removal Guide)

Clicks2apk.com is a site that tries to force you into subscribing to its browser notifications…

12 hours ago