{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-22957","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","assignerShortName":"vmware","dateUpdated":"2025-02-13T16:28:58.209Z","dateReserved":"2022-01-10T00:00:00.000Z","datePublished":"2022-04-13T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2023-04-18T19:06:16.134Z"},"descriptions":[{"lang":"en","value":"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution."}],"affected":[{"vendor":"n/a","product":"VMware Workspace ONE Access, Identity Manager and vRealize Automation.","versions":[{"version":"Access 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0. Identity Manager 3.3.6, 3.3.5, 3.3.4, 3.3.3. vRealize Automation 7.6.","status":"affected"}]}],"references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2022-0011.html"},{"url":"http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html"},{"url":"http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Remote code execution"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:28:42.555Z"},"title":"CVE Program Container","references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2022-0011.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html","tags":["x_transferred"]}]}]}}