CISA Issues Emergency Directive Requiring Federal Agencies Mitigate Vulnerabilities in VMware Products

Home / Articles / External / Government

https://www.ncua.gov/sites/default/files/inline-images/cyber-threat.jpg
Source: NCUA

June 1, 2022 | Originally published by CISA on May 18, 2022

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 22-03 today requiring federal civilian executive branch agencies running specific VMware products to apply VMware updates or remove the products from agency networks until the update can be applied. For all affected VMware products identified as being accessible from the internet, agencies are directed to assume a compromise and immediately disconnect the product from their network and conduct threat hunt activities.

The directive is in response to observed or expected active exploitation of a series of vulnerabilities (CVE 2022-22954, CVE 2022-22960, CVE-2022-22972, CVE-2022-22973) in the following VMware products:  VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager (impacted VMware products). Exploiting one of the four vulnerabilities permits attackers to execute remote code on a system without authentication and elevate privileges.

Focus Areas