VMware AirWatch Console updates address Broken Access Control vulnerability.
VMware AirWatch Console (AWC) Broken Access Control
VMware AirWatch Console (AWC) contains a Broken Access Control vulnerability. Successful exploitation of this issue could result in end-user device details being disclosed to an unauthorized administrator.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4942 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
*Additional patches are available for supported Airwatch releases. Please see KB115015676547 for more information.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware AirWatch Console 9.2.2
Downloads and Documentation:
6. Change log
Initial security advisory in conjunction with the release of VMware AirWatch Console patches on 2017-12-12.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
Consolidated list of VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2017 VMware Inc. All rights reserved.