VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
Published 2022-04-13 18:15:14
Updated 2023-04-19 15:15:07
Source VMware
View at NVD,   CVE.org
Vulnerability category: Gain privilege

CVE-2022-22960 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
VMware Multiple Products Privilege Escalation Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.
Added on 2022-04-15 Action due date 2022-05-06

Exploit prediction scoring system (EPSS) score for CVE-2022-22960

0.08%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2022-22960

  • VMware Workspace ONE Access CVE-2022-22960
    Disclosure Date: 2022-04-06
    First seen: 2023-09-11
    exploit/linux/local/vmware_workspace_one_access_cve_2022_22960
    This module exploits CVE-2022-22960 which allows the user to overwrite the permissions of the certproxyService.sh script so that it can be modified by the horizon user. This allows a local attacker with the uid 1001 to escalate their privileges to root access.

CVSS scores for CVE-2022-22960

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.2
HIGH AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
NIST
7.8
HIGH CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.8
5.9
NIST

CWE ids for CVE-2022-22960

  • The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
    Assigned by: nvd@nist.gov (Primary)

Products affected by CVE-2022-22960

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!