{"vuid":"VU#724367","idnumber":"724367","name":"VMware Workspace ONE Access and related components are vulnerable to command injection","keywords":null,"overview":"### Overview\r\nVMware [Workspace One Access](https://www.vmware.com/products/workspace-one.html), Access Connector, Identity Manager, and Identity Manager Connector are vulnerable to command injection in the administrative configurator. This could allow a remote attacker to execute commands with unrestricted privileges on the underlying operating system.\r\n\r\n### Description\r\nVMware [Workspace One Access](https://www.vmware.com/products/workspace-one.html), Access Connector, Identity Manager, and Identity Manager Connector are vulnerable to command injection in the administrative configurator. This could allow a remote attacker with access to the administrative configurator on port 8443 and a valid password to execute commands with unrestricted privileges on the underlying operating system. For additional details, please see [VMSA-2020-0027](https://www.vmware.com/security/advisories/VMSA-2020-0027.html) and [CVE-2020-4006](https://nvd.nist.gov/vuln/detail/CVE-2020-4006).\r\n\r\n### Impact\r\nThis could allow a malicious actor with network access to the administrative configurator on port 8443 and a valid password for the configurator admin account to execute commands with unrestricted privileges on the underlying operating system.\r\n\r\nActive exploitation of this vulnerability [has been reported](https://media.defense.gov/2020/Dec/07/2002547071/-1/-1/0/CSA_VMWARE%20ACCESS_U_OO_195076_20.PDF).\r\n\r\n### Solution\r\nVMware has released updates as described in [VMSA-2020-0027](https://www.vmware.com/security/advisories/VMSA-2020-0027.html).\r\n\r\n### Workarounds\r\nVMware has documented workarounds in [VMSA-2020-0027](https://www.vmware.com/security/advisories/VMSA-2020-0027.html).\r\n\r\n### Acknowledgements\r\nThanks to VMware for coordinating this vulnerability.\r\n\r\nThis document was written by Madison Oliver.","clean_desc":null,"impact":null,"resolution":null,"workarounds":null,"sysaffected":null,"thanks":null,"author":null,"public":["https://media.defense.gov/2020/Dec/07/2002547071/-1/-1/0/CSA_VMWARE%20ACCESS_U_OO_195076_20.PDF","https://www.vmware.com/security/advisories/VMSA-2020-0027.html","https://www.vmware.com/products/workspace-one.html"],"cveids":["CVE-2020-4006"],"certadvisory":null,"uscerttechnicalalert":null,"datecreated":"2020-11-23T18:22:14.630232Z","publicdate":"2020-11-23T18:22:14.518146Z","datefirstpublished":"2020-11-23T18:22:14.657377Z","dateupdated":"2020-12-08T15:53:32.559264Z","revision":5,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":null,"cvss_basevector":null,"cvss_temporalscore":null,"cvss_environmentalscore":null,"cvss_environmentalvector":null,"metric":null,"vulnote":32}