<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2216 Information about the VMware security vulnerability (CVE-2022-22972 &amp; CVE-2022-22973)</title><link>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2216 Information about the VMware security vulnerability (CVE-2022-22972 &amp; CVE-2022-22973)</title><link>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973</link><pubDate>Tue, 01 Nov 2022 20:59:01 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:36326f52-4e54-4c16-996d-a29c4d1980d3</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 11/1/2022 8:59:01 PM&lt;br /&gt;
&lt;p&gt;On 18-May-2022 an announcement was made regarding the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973). Following the announcement, Appian investigated and confirmed that none of the VMware Impacted Products are in use by Appian.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;VMware Impacted Products:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VMware Workspace ONE Access (Access)&lt;/li&gt;
&lt;li&gt;VMware Identity Manager (vIDM)&lt;/li&gt;
&lt;li&gt;VMware vRealize Automation (vRA)&lt;/li&gt;
&lt;li&gt;VMware Cloud Foundation&lt;/li&gt;
&lt;li&gt;vRealize Suite Lifecycle Manager&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Additional Notes:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;CISA has issued &lt;/span&gt;&lt;a href="https://www.cisa.gov/emergency-directive-22-03"&gt;&lt;span style="font-weight:500;"&gt;Emergency Directive (ED) 22-03&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; and released a &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;Cybersecurity Advisory (CSA)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; in response to active and expected exploitation of multiple vulnerabilities in the following VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation and vRealize Suite Lifecycle Manager.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;The CSA, &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt;, provides indicators of compromise and detection signatures from CISA as well as trusted third parties to assist administrators with detecting and responding to any active exploitation of CVE-2022-22954 and CVE-2022-22960. Malicious cyber actors were able to reverse-engineer the vendor updates to develop an exploit within 48 hours and quickly began exploiting these disclosed vulnerabilities in unpatched devices. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit CVE-2022-22972 and CVE-2022-22973, which were disclosed by VMware on May 18, 2022.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Supporting Documentation:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.vmware.com/security/advisories/VMSA-2022-0014.html"&gt;https://www.vmware.com/security/advisories/VMSA-2022-0014.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related"&gt;https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Timeline:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;18-May-2022 - CVE-2022-22972, CVE-2022-22973 released&lt;/li&gt;
&lt;li&gt;20-May-2022 - Appian confirmed that its product does not contain any instances of the impacted VMware products&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last reviewed: May 20, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2216 Information about the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973)</title><link>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973/revision/3</link><pubDate>Fri, 20 May 2022 17:17:22 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:36326f52-4e54-4c16-996d-a29c4d1980d3</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Elly Meng on 5/20/2022 5:17:22 PM&lt;br /&gt;
&lt;p&gt;On 18-May-2022 an announcement was made regarding the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973). Following the announcement, Appian investigated and confirmed that none of the VMware Impacted Products are in use by Appian.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;VMware Impacted Products:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VMware Workspace ONE Access (Access)&lt;/li&gt;
&lt;li&gt;VMware Identity Manager (vIDM)&lt;/li&gt;
&lt;li&gt;VMware vRealize Automation (vRA)&lt;/li&gt;
&lt;li&gt;VMware Cloud Foundation&lt;/li&gt;
&lt;li&gt;vRealize Suite Lifecycle Manager&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Additional Notes:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;CISA has issued &lt;/span&gt;&lt;a href="https://www.cisa.gov/emergency-directive-22-03"&gt;&lt;span style="font-weight:500;"&gt;Emergency Directive (ED) 22-03&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; and released a &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;Cybersecurity Advisory (CSA)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; in response to active and expected exploitation of multiple vulnerabilities in the following VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation and vRealize Suite Lifecycle Manager.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;The CSA, &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt;, provides indicators of compromise and detection signatures from CISA as well as trusted third parties to assist administrators with detecting and responding to any active exploitation of CVE-2022-22954 and CVE-2022-22960. Malicious cyber actors were able to reverse-engineer the vendor updates to develop an exploit within 48 hours and quickly began exploiting these disclosed vulnerabilities in unpatched devices. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit CVE-2022-22972 and CVE-2022-22973, which were disclosed by VMware on May 18, 2022.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Supporting Documentation:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.vmware.com/security/advisories/VMSA-2022-0014.html"&gt;https://www.vmware.com/security/advisories/VMSA-2022-0014.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related"&gt;https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Timeline:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;18-May-2022 - CVE-2022-22972, CVE-2022-22973 released&lt;/li&gt;
&lt;li&gt;20-May-2022 - Appian confirmed that its product does not contain any instances of the impacted VMware products&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last reviewed: May 20, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[DRAFT SP-7719] Information about the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973)</title><link>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973/revision/2</link><pubDate>Fri, 20 May 2022 16:59:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:36326f52-4e54-4c16-996d-a29c4d1980d3</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Elly Meng on 5/20/2022 4:59:32 PM&lt;br /&gt;
&lt;p&gt;On 18-May-2022 an announcement was made regarding the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973). Following the announcement, Appian investigated and confirmed that none of the VMware Impacted Products are in use by Appian.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;VMware Impacted Products:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VMware Workspace ONE Access (Access)&lt;/li&gt;
&lt;li&gt;VMware Identity Manager (vIDM)&lt;/li&gt;
&lt;li&gt;VMware vRealize Automation (vRA)&lt;/li&gt;
&lt;li&gt;VMware Cloud Foundation&lt;/li&gt;
&lt;li&gt;vRealize Suite Lifecycle Manager&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Additional Notes:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;CISA has issued &lt;/span&gt;&lt;a href="https://www.cisa.gov/emergency-directive-22-03"&gt;&lt;span style="font-weight:500;"&gt;Emergency Directive (ED) 22-03&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; and released a &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;Cybersecurity Advisory (CSA)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; in response to active and expected exploitation of multiple vulnerabilities in the following VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation and vRealize Suite Lifecycle Manager.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;The CSA, &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt;, provides indicators of compromise and detection signatures from CISA as well as trusted third parties to assist administrators with detecting and responding to any active exploitation of CVE-2022-22954 and CVE-2022-22960. Malicious cyber actors were able to reverse-engineer the vendor updates to develop an exploit within 48 hours and quickly began exploiting these disclosed vulnerabilities in unpatched devices. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit CVE-2022-22972 and CVE-2022-22973, which were disclosed by VMware on May 18, 2022.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Supporting Documentation:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.vmware.com/security/advisories/VMSA-2022-0014.html"&gt;https://www.vmware.com/security/advisories/VMSA-2022-0014.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related"&gt;https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Timeline:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;18-May-2022 - CVE-2022-22972, CVE-2022-22973 released&lt;/li&gt;
&lt;li&gt;20-May-2022 - Appian confirmed that its product does not contain any instances of the impacted VMware products&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last reviewed: May 20, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[DRAFT SP-7719] Information about the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973)</title><link>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973/revision/1</link><pubDate>Fri, 20 May 2022 16:55:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:36326f52-4e54-4c16-996d-a29c4d1980d3</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2646/kb-2216-information-about-the-vmware-security-vulnerability-cve-2022-22972-cve-2022-22973#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Elly Meng on 5/20/2022 4:55:18 PM&lt;br /&gt;
&lt;p&gt;On 18-May-2022 an announcement was made regarding the VMware security vulnerability (CVE-2022-22972, CVE-2022-22973). Following the announcement, Appian investigated and confirmed that none of the VMware Impacted Products are in use by Appian.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;VMware Impacted Products:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VMware Workspace ONE Access (Access)&lt;/li&gt;
&lt;li&gt;VMware Identity Manager (vIDM)&lt;/li&gt;
&lt;li&gt;VMware vRealize Automation (vRA)&lt;/li&gt;
&lt;li&gt;VMware Cloud Foundation&lt;/li&gt;
&lt;li&gt;vRealize Suite Lifecycle Manager&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Additional Notes:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;CISA has issued &lt;/span&gt;&lt;a href="https://www.cisa.gov/emergency-directive-22-03"&gt;&lt;span style="font-weight:500;"&gt;Emergency Directive (ED) 22-03&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; and released a &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;Cybersecurity Advisory (CSA)&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt; in response to active and expected exploitation of multiple vulnerabilities in the following VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation and vRealize Suite Lifecycle Manager.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:500;"&gt;The CSA, &lt;/span&gt;&lt;a href="http://www.cisa.gov/uscert/ncas/alerts/aa22-138b"&gt;&lt;span style="font-weight:500;"&gt;AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:500;"&gt;, provides indicators of compromise and detection signatures from CISA as well as trusted third parties to assist administrators with detecting and responding to the active exploitation of CVE-2022-22954 and CVE-2022-22960. Malicious cyber actors were able to reverse engineer the vendor updates to develop an exploit within 48 hours and quickly began exploiting these disclosed vulnerabilities in unpatched devices. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit CVE-2022-22972 and CVE-2022-22973, which were disclosed by VMware on May 18, 2022.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Supporting Documentation:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.vmware.com/security/advisories/VMSA-2022-0014.html"&gt;https://www.vmware.com/security/advisories/VMSA-2022-0014.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related"&gt;https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Timeline:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;18-May-2022 - CVE-2022-22972, CVE-2022-22973 released&lt;/li&gt;
&lt;li&gt;20-May-2022 - Appian confirmed that the product does not contain any instances of the impacted VMware products&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last reviewed: May 20, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item></channel></rss>