Rewterz Threat Alert – AgentTesla Information Stealer – IoCs
December 7, 2020Rewterz Threat Advisory – Wormable, Zero-Click Vulnerability in Microsoft Teams
December 8, 2020Rewterz Threat Alert – AgentTesla Information Stealer – IoCs
December 7, 2020Rewterz Threat Advisory – Wormable, Zero-Click Vulnerability in Microsoft Teams
December 8, 2020Severity
High
Analysis Summary
The vulnerability is tracked as CVE-2020-4006 and it has been found to impact the VMware Workspace ONE Access identity management product and some related components, including Identity Manager (vIDM) on Linux, vIDM Connector on Windows and Linux, VMware Cloud Foundation and vRealize Suite Lifecycle Manager. An attacker who has gained access to the system’s web-based management interface can exploit the vulnerability to execute arbitrary commands with elevated privileges on the underlying operating system.
It has recently been reported that Russian state-sponsored malicious cyber actors have been exploiting CVE-2020-4006. Information about the targets of this attack has not been released. Based on the disclosure timeline, it’s likely that the security hole was being exploited before a patch was released. The exploitation via command injection led to installation of a web shell and follow-on malicious activity where credentials in the form of SAML authentication assertions were generated and sent to Microsoft Active Directory Federation Services (ADFS), which in turn granted the actors access to protected data.
Impact
- Unauthorized Access
- Command Execution
- Exposure of Sensitive Data
Affected Vendors
VMware
Affected Products
- VMware Workspace One Access (Access)
- VMware Workspace One Access Connector (Access Connector)
- VMware Identity Manager (vIDM)
- VMware Identity Manager Connector (vIDM Connector)
- VMware Cloud Foundation
- vRealize Suite Lifecycle Manager
Remediation
- Refer to VMware Security Advisory VMSA-2020-0027 for the complete list of affected products and their respective patches.
https://www.vmware.com/security/advisories/VMSA-2020-0027.html - Immediately update affected products to patched versions.
- Reduce the risk of exploitation by setting a unique and strong password, as well as ensuring that the web-based management interface is not accessible from the internet.