Breaking

CISA asks Admins to patch VMware Workspace ONE UEM vulnerability

CISA has requested VMware users to patch a critical vulnerability in the Workspace ONE UEM that cyber criminals could exploit to access sensitive data.

For those who aren’t aware about Workspace ONE, its a Unified Endpoint Management Solution from VMware for over-the-air device management. The vulnerability is tracked as CVE-2021-22054 and is marked at 9.1/10 severity rating. Hackers can leverage this vulnerability remotely and gain access to the sensitive information using the UEM console. VMware has also released a security advisory addressing the case.

Below is the list of impacted versions of VMware Workspace ONE UEM vulnerability,

Impacted VersionFixed Version
2109Workspace ONE UEM patch 21.9.0.13 and above
2105Workspace ONE UEM patch 21.5.0.37 and above
2102Workspace ONE UEM patch 21.2.0.27 and above
2101Workspace ONE UEM patch 21.1.0.27 and above
2011Workspace ONE UEM patch 20.11.0.40 and above
2010Workspace ONE UEM patch 20.10.0.23 and above
2008Workspace ONE UEM patch 20.8.0.36 and above
2007Workspace ONE UEM patch 20.7.0.17 and above

Workaround for VMWare Workspace ONE UEM vulnerability

VMware has given a workaround for this vulnerability if you aren’t able to update the version immediately. The workaround is to edit the UEM web.config file by doing the steps mentioned in their article.

Admins can also test the workaround by opening a browser and navigating to the below URLS,

https://[UEM Console URL]/airwatch/blobhandler.ashx?url=test
https://[UEM Console URL]/catalog/blobhandler.ashx?url=test
https://[UEM Console URL]/airwatch/blobhandler.ashx?param1=test&url=test
https://[UEM Console URL]/catalog/blobhandler.ashx?param1=test&url=test

If you get 404 Not Found error then everything is good.

VMware said that the IIS reset will make the logged-in admins to the server instance with patching to be logged out. After a while, admins will be able to login into the console.

While the workaround is good, its always best to patch it as the VMware Workspace ONE UEM vulnerability is a critical security exploit and  hence its best if users can update it to the latest version by deploying the patches before its too late.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit. You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago