Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2676 VMware AirWatch Agent and VMware Content Locker updates resolve data protection vulnerabilities. 7 September 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware AirWatch Agent and VMware Content Locker Publisher: VMWare Operating System: Apple iOS Impact/Access: Access Privileged Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-6976 CVE-2018-6975 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2018-0023.html - --------------------------BEGIN INCLUDED TEXT-------------------- VMware Security Advisory Advisory ID: VMSA-2018-0023 Severity: Low Synopsis: AirWatch Agent and VMware Content Locker updates resolve data protection vulnerabilities. Issue date: 2018-09-05 Updated on: 2018-09-05 (Initial Advisory) CVE number: CVE-2018-6975 CVE-2018-6976 1. Summary AirWatch Agent and VMware Content Locker updates resolve data protection vulnerabilities. 2. Relevant Products AirWatch Agent for iOS (A/W Agent) VMware Content Locker for iOS (A/W Locker) 3. Problem Description a. The AirWatch Agent for iOS devices contains a data protection vulnerability The AirWatch Agent for iOS devices contains a data protection vulnerability whereby the files and keychain entries in the Agent are not encrypted. VMware would like to thank Stephan Sekula of Compass Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6975 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround A/W Agent x.x iOS Low 5.8.1 None b. The VMware Content Locker for iOS devices contains a data protection vulnerability The VMware Content Locker for iOS devices contains a data protection vulnerability in the SQLite database. This vulnerability relates to unencrypted filenames and associated metadata in SQLite database for the Content Locker. VMware would like to thank Stephan Sekula of Compass Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6976 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround A/W Locker x.x iOS Low 4.14 None 4. Solution AirWatch Agent for iOS 5.8.1 Downloads and Documentation: https://itunes.apple.com/us/app/airwatch-agent/id338761996?mt=3D8 VMware Content Locker for iOS 4.14 Downloads and Documentation: https://itunes.apple.com/us/app/vmware-content-locker/id525890839?mt=3D8 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6976 - - ------------------------------------------------------------------------ 6. Change log 2018-09-05: Initial security advisory in conjunction with the release of VMware Content Locker for iOS 4.14 on 2018-09-05 - - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com<mailto:security-announce@lists.vmwar= e.com> bugtraq@securityfocus.com<mailto:bugtraq@securityfocus.com> fulldisclosure@seclists.org<mailto:fulldisclosure@seclists.org> E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW5ISvGaOgq3Tt24GAQhgpA//ZJJCJkWsFz1uDIJJu34P0XuXU1UO8b2c EAJouZzA0VAVGKKo8AsoFDKQ2OvtuhGi9k2O+0ybOUBsxp8heGPtGSVbYJDqVK1R NLmgRsID0GHXOxSeTBwhCgqr+YGUPsmz/FIEIEZLkwtPyHRQ4MCb6UuJjES9wQ/h mAk768GrU0bqmUARkvDu7KOZLwLQ8ZeOm9YNddoKJv7GJPp8UvQ9DksVysGPmc3A MZhiv6fdZFFYNEUKbFBSTNMfdMEEj/e3a2daZUWZGtvqf37VF+W/oE7NlLoZQhc5 7Zb0caaoAvgMnWGVA7OObOF8Lbmv7fBJXjpIRxhGkRV0OgdC/ekGBDgb0RrYqfNm Yy+d81BnvaAzpNK9GFHwXRN7rSZyxcV3jUCYh692O4H5vPLXVIYT9IUmcz2cQnRc eLdx6FH/KjW6xfdTkfNaT5OaQyFuepkz6rLEbynmGxT/MyeDWQzMGSy/lSiXbCQB nxRvWth+1h04mpJ4RYATV/13RbYAlVv83TgikR10FxesPfTXNvChJByeKBfiWdGV EFurHe/zGLAaighpwYG04TW19TpHLT3xgY2H926zGnJRKjD7OiYh/zD+mniWSrDJ bKGRvyBqqGS/0vmbW3bOCYGBKz9oQsVhg342ok6SIFRrOzorp2kE6JSZfle2nT71 TWJMKhdTWqc= =1r9R -----END PGP SIGNATURE-----