cve-2021-22003
Vulnerability from cvelistv5
Published
2021-08-31 21:02
Modified
2024-08-03 18:30
Severity ?
EPSS score ?
Summary
VMware Workspace ONE Access and Identity Manager, unintentionally provide a login interface on port 7443. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account.
References
▼ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2021-0016.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2021-0016.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | VMware Workspace ONE Access and Identity Manager |
Version: Workspace ONE Access 20.10.01, 20.10 & 20.01. Identity Manager 3.3.5, 3.3.4, 3.3.3 & 3.3.2. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:30:23.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2021-0016.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Workspace ONE Access and Identity Manager", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Workspace ONE Access 20.10.01, 20.10 \u0026 20.01. Identity Manager 3.3.5, 3.3.4, 3.3.3 \u0026 3.3.2." } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workspace ONE Access and Identity Manager, unintentionally provide a login interface on port 7443. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-31T21:02:31", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2021-0016.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2021-22003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Workspace ONE Access and Identity Manager", "version": { "version_data": [ { "version_value": "Workspace ONE Access 20.10.01, 20.10 \u0026 20.01. Identity Manager 3.3.5, 3.3.4, 3.3.3 \u0026 3.3.2." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workspace ONE Access and Identity Manager, unintentionally provide a login interface on port 7443. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2021-0016.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2021-0016.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2021-22003", "datePublished": "2021-08-31T21:02:31", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:30:23.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:identity_manager:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22BC2D96-5922-4995-B006-1BAB5FE51D93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97D98937-489B-4AA5-B99E-9AB639C582CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E93CB5E-CB4A-474A-9901-2E098928C489\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A215A7D-F644-41DE-AB4E-69145DA48F9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:workspace_one_access:20.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFFD453B-7658-4FDA-BA4D-B13681F51724\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:workspace_one_access:20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDC57F3A-E726-4EE5-924D-9C94FED4718D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:workspace_one_access:20.10.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2F7CB4-8425-4D9F-97FC-AD96D9ABC202\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38EB0C0C-56CF-4A8F-A36F-E0E180B9059E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A54544F5-5929-4609-A91C-FCA0FDBFE862\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:cloud_foundation:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA6D6348-E71A-4DA4-AC84-51397B2461A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:cloud_foundation:4.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8EC0B43-8667-45D6-BF97-03DDFFAD2AF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:cloud_foundation:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC4C5700-1AFE-49F6-AC92-09F2349345ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3318D91-40AC-4649-8FCD-4557C8F934B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A06C29AB-1EAF-43EF-96C3-9E3468911B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43723EC2-295E-4AF7-B654-70F9E42F4807\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFB84C30-EE5D-4C15-A74E-7B2B3E0DED4D\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"VMware Workspace ONE Access and Identity Manager, unintentionally provide a login interface on port 7443. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account.\"}, {\"lang\": \"es\", \"value\": \"VMware Workspace ONE Access y Identity Manager, proporcionan sin intenci\\u00f3n una interfaz de inicio de sesi\\u00f3n en el puerto 7443. Un actor malicioso con acceso a la red al puerto 7443 puede intentar enumerar a usuarios o forzar el endpoint de inicio de sesi\\u00f3n, que puede o no ser pr\\u00e1ctico basado en la configuraci\\u00f3n de la pol\\u00edtica de bloqueo y la complejidad de la contrase\\u00f1a de la cuenta de destino\"}]", "id": "CVE-2021-22003", "lastModified": "2024-11-21T05:49:25.333", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2021-08-31T22:15:08.367", "references": "[{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2021-0016.html\", \"source\": \"security@vmware.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2021-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-307\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-22003\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2021-08-31T22:15:08.367\",\"lastModified\":\"2024-11-21T05:49:25.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VMware Workspace ONE Access and Identity Manager, unintentionally provide a login interface on port 7443. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account.\"},{\"lang\":\"es\",\"value\":\"VMware Workspace ONE Access y Identity Manager, proporcionan sin intenci\u00f3n una interfaz de inicio de sesi\u00f3n en el puerto 7443. Un actor malicioso con acceso a la red al puerto 7443 puede intentar enumerar a usuarios o forzar el endpoint de inicio de sesi\u00f3n, que puede o no ser pr\u00e1ctico basado en la configuraci\u00f3n de la pol\u00edtica de bloqueo y la complejidad de la contrase\u00f1a de la cuenta de destino\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:identity_manager:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22BC2D96-5922-4995-B006-1BAB5FE51D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D98937-489B-4AA5-B99E-9AB639C582CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E93CB5E-CB4A-474A-9901-2E098928C489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A215A7D-F644-41DE-AB4E-69145DA48F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workspace_one_access:20.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFFD453B-7658-4FDA-BA4D-B13681F51724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workspace_one_access:20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC57F3A-E726-4EE5-924D-9C94FED4718D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workspace_one_access:20.10.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2F7CB4-8425-4D9F-97FC-AD96D9ABC202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EB0C0C-56CF-4A8F-A36F-E0E180B9059E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54544F5-5929-4609-A91C-FCA0FDBFE862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA6D6348-E71A-4DA4-AC84-51397B2461A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:4.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8EC0B43-8667-45D6-BF97-03DDFFAD2AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4C5700-1AFE-49F6-AC92-09F2349345ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3318D91-40AC-4649-8FCD-4557C8F934B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06C29AB-1EAF-43EF-96C3-9E3468911B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43723EC2-295E-4AF7-B654-70F9E42F4807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB84C30-EE5D-4C15-A74E-7B2B3E0DED4D\"}]}]}],\"references\":[{\"url\":\"https://www.vmware.com/security/advisories/VMSA-2021-0016.html\",\"source\":\"security@vmware.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.vmware.com/security/advisories/VMSA-2021-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.