The VMware Workspace ONE Unified Endpoint Management Console (A/W Console) 9.7.x prior to 9.7.0.3, 9.6.x prior to 9.6.0.7, 9.5.x prior to 9.5.0.16, 9.4.x prior to 9.4.0.22, 9.3.x prior to 9.3.0.25, 9.2.x prior to 9.2.3.27, and 9.1.x prior to 9.1.5.6 contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. This vulnerability is also relevant if certificate-based authentication is not enabled, but the outcome of exploitation is limited to an information disclosure (Important Severity) in those cases.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041808 | Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2018-0024.html | Vendor Advisory |
http://www.securitytracker.com/id/1041808 | Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2018-0024.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1041808 - Third Party Advisory, VDB Entry | |
References | () https://www.vmware.com/security/advisories/VMSA-2018-0024.html - Vendor Advisory |
Information
Published : 2018-10-05 12:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-6979
Mitre link : CVE-2018-6979
CVE.ORG link : CVE-2018-6979
JSON object : View
Products Affected
vmware
- airwatch_console
CWE