Operating System:

[Mobile]

Published:

10 January 2020

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0104
 VMSA-2020-0001: VMware Workspace ONE SDK fixes certificate pinning error
                              10 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware Workspace ONE SDK
                   Applications using VMware Workspace ONE SDK
Publisher:         VMWare
Operating System:  Mobile Device
Impact/Access:     Access Confidential Data       -- Remote with User Interaction
                   Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3940  

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2020-0001.html

- --------------------------BEGIN INCLUDED TEXT--------------------

+-----------------------------------------------------------------------------+
|Advisory |VMSA-2020-0001                                                     |
|ID       |                                                                   |
|---------+-------------------------------------------------------------------|
|Advisory |Moderate                                                           |
|Severity |                                                                   |
|---------+-------------------------------------------------------------------|
|CVSSv3   |6.8                                                                |
|Range    |                                                                   |
|---------+-------------------------------------------------------------------|
|         |VMware Workspace ONE SDK and dependent mobile application updates  |
|Synopsis |address sensitive information disclosure vulnerability             |
|         |(CVE-2020-3940)                                                    |
|---------+-------------------------------------------------------------------|
|Issue    |2020-01-09                                                         |
|Date     |                                                                   |
|---------+-------------------------------------------------------------------|
|Updated  |2020-01-09 (Initial Advisory)                                      |
|On       |                                                                   |
|---------+-------------------------------------------------------------------|
|CVE(s)   |CVE-2020-3940                                                      |
+-----------------------------------------------------------------------------+

1. Impacted Products

  * Workspace ONE SDK
  * Workspace ONE Boxer
  * Workspace ONE Content
  * Workspace ONE SDK Plugin for Apache Cordova
  * Workspace ONE Intelligent Hub
  * Workspace ONE Notebook
  * Workspace ONE People
  * Workspace ONE PIV-D
  * Workspace ONE Web
  * Workspace ONE SDK Plugin for Xamarin

2. Introduction

A sensitive information disclosure vulnerability in the VMware Workspace ONE
SDK was privately reported to VMware. Updates are available to address this
vulnerability in affected VMware products.

3. VMware Workspace ONE SDK and dependent mobile application updates address
sensitive information disclosure vulnerability (CVE-2020-3940)

Description:

VMware Workspace ONE SDK and dependent mobile applications do not properly
handle certificate verification failures if SSL Pinning has been enabled in
the Workspace ONE UEM Console. VMware has evaluated the severity of this issue
to be in the moderate severity range with a maximum CVSSv3 base score of 6.8.

Known Attack Vectors:

A malicious actor with man-in-the-middle (MITM) network positioning between an
affected mobile application and Workspace ONE UEM Device Services may be able
to capture sensitive data in transit if SSL Pinning is enabled.

Resolution:

To remediate CVE-2020-3940, apply the patches listed in the 'Fixed Version'
column of the 'Resolution Matrix' found below.

Workarounds:

None.

Additional Documentations:

None.

Acknowledgements:

None.

Response Matrix:

+---------------------------------------------------------------------------------------------+
|Product      |Version|Running|CVE          |CVSSV3|Severity|Fixed     |Workarounds|Additional|
|             |       |On     |Identifier   |      |        |Version   |           |Documents |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|19.x.y |Android|CVE-2020-3940|6.8   |Moderate|19.11.1   |None       |None      |
|SDK          |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|       |       |             |      |        |          |           |          |
|SDK          |5.9.9.x|iOS    |CVE-2020-3940|6.8   |Moderate|5.9.9.8   |None       |None      |
|(Objective-C)|       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|SDK (Swift)  |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |Android|CVE-2020-3940|6.8   |Moderate|5.13.1    |None       |None      |
|ONE Boxer    |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|ONE Boxer    |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |Android|CVE-2020-3940|6.8   |Moderate|3.2.1     |None       |None      |
|ONE Content  |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |iOS    |CVE-2020-3940|6.8   |Moderate|4.2       |None       |None      |
|ONE Content  |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|       |       |             |      |        |          |           |          |
|SDK Plugin   |Any    |Any    |CVE-2020-3940|6.8   |Moderate|1.5.1     |None       |None      |
|for Apache   |       |       |             |      |        |          |           |          |
|Cordova      |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|       |       |             |      |        |          |           |          |
|Intelligent  |Any    |Android|CVE-2020-3940|6.8   |Moderate|19.11.1   |None       |None      |
|Hub          |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|       |       |             |      |        |          |           |          |
|Intelligent  |Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|Hub          |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |Android|CVE-2020-3940|6.8   |Moderate|1.2.1     |None       |None      |
|ONE Notebook |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|ONE Notebook |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |Android|CVE-2020-3940|6.8   |Moderate|1.3.2     |None       |None      |
|ONE People   |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|ONE People   |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |Android|CVE-2020-3940|6.8   |Moderate|1.4.2     |None       |None      |
|ONE PIV-D    |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|ONE PIV-D    |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|Any    |Android|CVE-2020-3940|6.8   |Moderate|7.10.8    |None       |None      |
|Web          |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace    |Any    |iOS    |CVE-2020-3940|N/A   |N/A     |Unaffected|N/A        |N/A       |
|ONE Web      |       |       |             |      |        |          |           |          |
|-------------+-------+-------+-------------+------+--------+----------+-----------+----------|
|Workspace ONE|       |       |             |      |        |          |           |          |
|SDK Plugin   |Any    |Any    |CVE-2020-3940|6.8   |Moderate|1.4.1     |None       |None      |
|for Xamarin  |       |       |             |      |        |          |           |          |
+---------------------------------------------------------------------------------------------+

4. References

Fixed Version(s) and Release Notes:

Workspace ONE SDK for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/
VMware-Workspace-ONE-SDK-for-Android.html

Workspace ONE SDK for iOS (Objective-C)

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/
VMware-Workspace-ONE-SDK-for-iOS--Objective-C-.html

Workspace ONE Boxer for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-Boxer/services/rn/
VMware-Workspace-ONE-Boxer-for-Android.html

Workspace ONE Content for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-Content/services/rn/
Workpace-ONE-Content-for-Android.html

Workspace ONE Content for iOS

https://docs.vmware.com/en/VMware-Workspace-ONE-Content/services/rn/
Workspace-ONE-Content-for-iOS.html

Workspace ONE SDK Plugin for Apache Cordova

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/
VMware-Workspace-ONE-SDK-Plugin-for-Apache-Cordova.html

Workspace ONE Intelligent Hub for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-Intelligent-Hub/services/rn/
Introducing-VMware-Workspace-ONE-Intelligent-Hub-1909-for-Android.html

Workspace ONE Notebook for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-Notebook/services/rn/
VMware-Workspace-ONE-Notebook-for-Android.html

Workspace ONE People for Android

https://kb.vmware.com/s/article/76713

Workspace ONE PIV-D for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/
VMware-Workspace-ONE-PIV-D-Manager-for-Android.html

Workspace ONE Web for Android

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/
VMware-Workspace-ONE-Web-for-Android.html

Workspace ONE SDK Plugin for Xamarin

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/
VMware-Workspace-ONE-SDK-Plugin-for-Xamarin.html

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3940

FIRST CVSSv3 Calculator:
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/
I:N/A:N

5. Change log

2019-01-09 : VMSA-2020-0001
Initial security advisory on 2020-01-09.

6. Contact

E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  security-announce@lists.vmware.com

  bugtraq@securityfocus.com

  fulldisclosure@seclists.org

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=e670
-----END PGP SIGNATURE-----