Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
Advanced threat actors are currently exploiting a critical remote code execution (RCE) vulnerability due to a server-side template injection, tracked as CVE-2022-22954, in VMware Workspace ONE Access and Identity Manager. The vulnerability was addressed on April 6, 2022, and a patch was issued, however, by April 13, 2022, a proof of concept (PoC) exploit code was published – allowing attackers to target vulnerable systems. The vulnerability has been given a CVSSv3 score of 9.8.
VMware is cloud computing and virtualization platform used by 500,000 organizations and their Workspace ONE Access software provides multi-factor authentication and single-sign-on to SaaS, as well as mobile apps.
An Iranian cyber espionage group named Rocket Kitten has already begun to exploit CVE-2022-22954. According to VMware, attackers can bypass the authentication mechanism in VMware Workspace ONE Access and Identity Manager and execute any operation due to exposed endpoints in the authentication framework. Before reports regarding Rocket Kitten were published, the researchers at Morphisec Labs believed that the threat actors exploiting the vulnerability were APTs due to indicators of a sophisticated Core Impact backdoor. The tactics and techniques they discovered are common amongst APTs like Rocket Kitten.
Impacted versions:
According to Morphisec Labs, CVE-2022-22954 is a server-side template injection and it affects an Apache Tomcat component, which allows for malicious commands to be executed on the hosting server. Morphisec has also detected PowerShell commands executed as child processes to Tomcat “prunsr.exe” process application. If an attacker is successful and gains access, they can achieve full remote code execution against VMware’s identity access management.
With this new vulnerability, attackers can deploy ransomware or coin miners for initial access, lateral movement, or privilege escalation. Threat actors were also observed launching reverse HTTPS, such as Metasploit and Cobalt Strike. If the attacker has privileged access, they can bypass defenses, including antivirus and endpoint detection and response.
Because many threat actors are exploiting CVE-2022-22954 and they don’t need administrative access to do so, it’s important to implement VMware’s patch. The company has also issued workarounds for the vulnerability which you can find below. Patching is one of the best ways to prevent threat actors from compromising your organization. Don’t wait until your organization is breached to take action.
Iranian Hacking Group Among Those Exploiting Recently Disclosed VMware RCE Flaw (darkreading.com)
Hackers exploit critical VMware RCE flaw to install backdoors (bleepingcomputer.com)
VMWare Identity Manager Attack: New Backdoor Discovered (morphisec.com)
Related Reading: Flash Notice: [CVE-2022-22965] Critical Zero-Day RCE Vulnerability Found in VMware's Spring Framework
Contact us for more information about Avertium’s managed security service capabilities.