SB2017111011 - Multiple vulnerabilities in VMware AirWatch
Published: November 10, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2017-4930)
The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Improper access control (CVE-ID: CVE-2017-4931)
The vulnerability allows a remote authenticated attacker to modify log files on the target system.
The weakness exists due to a flaw in the AirWatch Console. A remote attacker can add data to the target enrolled device's CSV log files.
3) Privilege escalation (CVE-ID: CVE-2017-4932)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to a flaw in the AirWatch Launcher for Android. A local attacker can gain privileged access to the system and perform arbitrary actions.
Remediation
Install update from vendor's website.