Breaking

CISA asks Admins to patch VMware Workspace ONE UEM vulnerability

CISA has requested VMware users to patch a critical vulnerability in the Workspace ONE UEM that cyber criminals could exploit to access sensitive data.

For those who aren’t aware about Workspace ONE, its a Unified Endpoint Management Solution from VMware for over-the-air device management. The vulnerability is tracked as CVE-2021-22054 and is marked at 9.1/10 severity rating. Hackers can leverage this vulnerability remotely and gain access to the sensitive information using the UEM console. VMware has also released a security advisory addressing the case.

Below is the list of impacted versions of VMware Workspace ONE UEM vulnerability,

Impacted VersionFixed Version
2109Workspace ONE UEM patch 21.9.0.13 and above
2105Workspace ONE UEM patch 21.5.0.37 and above
2102Workspace ONE UEM patch 21.2.0.27 and above
2101Workspace ONE UEM patch 21.1.0.27 and above
2011Workspace ONE UEM patch 20.11.0.40 and above
2010Workspace ONE UEM patch 20.10.0.23 and above
2008Workspace ONE UEM patch 20.8.0.36 and above
2007Workspace ONE UEM patch 20.7.0.17 and above

Workaround for VMWare Workspace ONE UEM vulnerability

VMware has given a workaround for this vulnerability if you aren’t able to update the version immediately. The workaround is to edit the UEM web.config file by doing the steps mentioned in their article.

Admins can also test the workaround by opening a browser and navigating to the below URLS,

https://[UEM Console URL]/airwatch/blobhandler.ashx?url=test
https://[UEM Console URL]/catalog/blobhandler.ashx?url=test
https://[UEM Console URL]/airwatch/blobhandler.ashx?param1=test&url=test
https://[UEM Console URL]/catalog/blobhandler.ashx?param1=test&url=test

If you get 404 Not Found error then everything is good.

VMware said that the IIS reset will make the logged-in admins to the server instance with patching to be logged out. After a while, admins will be able to login into the console.

While the workaround is good, its always best to patch it as the VMware Workspace ONE UEM vulnerability is a critical security exploit and  hence its best if users can update it to the latest version by deploying the patches before its too late.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit. You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago