WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships VMWare Releases Security Advisory Addressing Multiple Security Vulnerabilities, Urges Organizations to Patch Immediately
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

VMWare Releases Security Advisory Addressing Multiple Security Vulnerabilities, Urges Organizations to Patch Immediately

Author: Alec Davison

Created: Tuesday, August 2, 2022 - 19:26

Categories: Cybersecurity, Security Preparedness

Today, VMWare released a security advisory warning system administrators to patch a critical authentication bypass security vulnerability that affects local domain users in multiple products and allows unauthenticated attackers to gain admin privileges.

The vulnerability, tracked as CVE-2022-31656, impacts VMware Workspace ONE Access, Identity Manager, and vRealize Automation. VMWare also patched additional security flaws enabling threat actors to gain remote code execution (CVE-2022-31658, CVE-2022-31659, CVE-2022-31665) and escalate privileges to ‘root’ (CVE-2022-31660, CVE-2022-31661, CVE-2022-31664) on unpatched servers. As previously mentioned, these vulnerabilities could allow attackers to gain authentication bypass, remote code execution, and privilege escalation on a compromised system.

“It is extremely important that you quickly take steps to patch or mitigate these issues in on-premises deployments,” according to Bob Plankers, cloud infrastructure security & compliance architect at VMware. “If your organization uses ITIL methodologies for change management, this would be considered an “emergency” change.”

The complete list of VMware products impacted by these vulnerabilities includes:

  • VMware Workspace ONE Access (Access)
  • VMware Workspace ONE Access Connector (Access Connector)
  • VMware Identity Manager (vIDM)
  • VMware Identity Manager Connector (vIDM Connector)
  • VMware vRealize Automation (vRA)
  • VMware Cloud Foundation
  • vRealize Suite Lifecycle Manager

VMWare has also created a support document with a list of questions and answers regarding the critical bug patched today. For mitigation measures, members are encouraged to immediately deploy the vendor updates and review this WaterISAC post from late May concerning previous VMWare vulnerabilities. Access the full security advisory at VMWare or read additional information at BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar