{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-22956","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","assignerShortName":"vmware","dateUpdated":"2025-02-13T16:28:57.648Z","dateReserved":"2022-01-10T00:00:00.000Z","datePublished":"2022-04-13T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2023-04-18T19:06:17.459Z"},"descriptions":[{"lang":"en","value":"VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework."}],"affected":[{"vendor":"n/a","product":"VMware Workspace ONE Access","versions":[{"version":"Access 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0.","status":"affected"}]}],"references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2022-0011.html"},{"url":"http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html"},{"url":"http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Authentication bypass"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:28:42.857Z"},"title":"CVE Program Container","references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2022-0011.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html","tags":["x_transferred"]}]}]}}