16-05-2023

Broken Authentication Method in VMWare Workspace ONE Assist

CVE-2022-31686

During a security assessment REQON has discovered multiple security vulnerabilities in the VMWare ONE Assist software. These vulnerabilities are rated using the CVSSv3.1 risk calculator and vary from critical to medium level risks.

VMware Workspace ONE Assist is a remote support and troubleshooting software that enables IT support teams to remotely access and control end-user devices, including desktops, laptops, and mobile devices. With Workspace ONE Assist, IT support technicians can troubleshoot and resolve issues by remotely accessing and controlling end-user devices, without requiring them to be physically present at the device’s location. The software provides secure remote control capabilities, screen sharing, file transfer, and chat functions.

The software is often also referred to as Remote Assist.

During a security assessment REQON has discovered multiple security vulnerabilities in the software. These vulnerabilities are rated using the CVSSv3.1 risk calculator and vary from critical to medium level risks.

The vulnerabilities have been assigned the following CVE tracking numbers:

  • CVE-2022-31685
  • CVE-2022-31686
  • CVE-2022-31687
  • CVE-2022-31688
  • CVE-2022-31689

After being notified of the vulnerabilities, VMWare has released multiple security updates to mitigate the discovered findings.

This blog post will provide the Proof of Concept (PoC) code of one of the discovered vulnerabilities, namely: The Authentication Bypass. The PoC of the remaining vulnerabilities is provided in a separate blog post.

Vulnerability description

The VMWare ONE Remote Assist application requires an authentication (AUTH) token to perform authorized actions, such as taking over devices, creating and/or changing application users.

During the pentest a SOAP-endpoint was discovered that can be used to request an AUTH token for every user of the application without any form of authentication. The endpoint is located at the following URL:

/ProtectedUserMgmt/UserAuthentication.asmx

The screenshot below shows the request and response in the HTTP-proxy tool Burp Suite:

Request

The following screenshot shows that the session token obtained with the previous request can be used to query all available devices:

Request

Impact

This vulnerability allows an attacker to take over any account available in the VMWare ONE Remote Assist application without any form of authentication. The only required information is the username of the targeted user.

Remediation

REQON strongly advises administrators of the VMWare ONE Remote Assist application to install the patches provided by VMWare.
If for some reason, implementing the patches is not feasible, it is recommended to block access to the/ProtectedUserMgmt/UserAuthentication.asmx endpoint for IP addresses other than the UEM server. This significantly reduces the likelihood of exploiting this vulnerability. However, it is unclear whether this measure will have any functional impact on the application.

Any questions regarding this blog?

Please contact REQON via info@reqon.nl