
Cloud Vulnerability DB
A community-led vulnerabilities database
A command injection vulnerability (CVE-2020-4006) was identified in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. The vulnerability was privately reported to VMware and initially disclosed on November 23, 2020, with updates following on December 3, 2020 (CERT VU, VMSA Advisory).
The vulnerability exists in the administrative configurator component of the affected VMware products. It received a CVSSv3 base score of 7.2, categorized as 'Important' severity. The vulnerability specifically affects the administrative configurator accessible on port 8443 (VMSA Advisory).
A malicious actor with network access to the administrative configurator on port 8443 and valid credentials for the configurator admin account can execute commands with unrestricted privileges on the underlying operating system. The password for this account is set during deployment, and potential methods for credential theft are documented in T1586 of the MITRE ATT&CK database (CERT VU, VMSA Advisory).
VMware released fixes for the affected products as documented in KB81754. Additionally, workarounds were made available in KB81731 for systems where immediate patching was not possible (VMSA Advisory).
The vulnerability received attention from government security organizations, with the Cybersecurity and Infrastructure Security Agency (CISA) issuing an alert encouraging users and administrators to review the VMware Security Advisory and apply necessary workarounds (CISA Alert).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."