copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
Search this site

On this site

 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login


ESB-2014.2351 - [Win] VMware AirWatch: Access confidential data - Existing account

Date: 11 December 2014

Click here for printable version
Click here for PGP verifiable version
Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

          AirWatch by VMware product update addresses information
                        disclosure vulnerabilities
                             11 December 2014


        AusCERT Security Bulletin Summary

Product:           VMware AirWatch
Publisher:         VMware
Operating System:  Windows
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-8372  

Original Bulletin:

- --------------------------BEGIN INCLUDED TEXT--------------------

VMware Security Advisories



AirWatch by VMware product update addresses information disclosure 

VMware Security Advisory

Advisory ID: VMSA-2014-0014

Synopsis: AirWatch by VMware product update addresses information disclosure 

Issue date: 2014-12-10

Updated on: 2014-12-10 (Initial Advisory)

CVE numbers: CVE-2014-8372

1. Summary

AirWatch by VMware product update addresses information disclosure 

2. Relevant releases AirWatch by VMware on-premise 7.3.x.x prior to 

3. Problem Description 

a. AirWatch by VMware information disclosure vulnerability

AirWatch by VMware has direct object reference vulnerabilities. These issues 
may allow a user that manages an AirWatch deployment in a multi-tenant 
environment to view the organizational information and statistics of another 

AirWatch Cloud has been patched to resolve this issue, On-Premise deployments
must be updated. See solution section for details.

VMware would like to thank Denis Andzakovic of for 
reporting this issue to us.

The Common Vulnerabilities and Exposures project ( has assigned
the identifier CVE-2014-8372 to this issue.

Column 4 of the following table lists the action required to remediate the 
vulnerability in each release, if a solution is available.

VMware Product	Product Version 	Running on  	Replace with/Apply 

AirWatch Cloud	N/A 			any 		No action required. 

AirWatch 	7.3.x.x 		any (FP3)

4. Solution

Please review the patch/release notes for your product and version and verify
the checksum of your downloaded file.

AirWatch On-Premise 


To perform a self-upgrade, please email to request the 
install files. (Please note that only requests submitted by your companys 
AirWatch Administrator(s) will be accepted).

Customers may also to engage an AirWatch Upgrades Engineer to perform the 
upgrade on their behalf. To engage an AirWatch Upgrades Engineer, please reach
out to your Account Executive for more information.

Release Documentation:

5. References

6. Change log

2014-12-10 VMSA-2014-0014

Initial security advisory in conjunction with the release of AirWatch 
on-premise on 2014-12-10.

7. Contact

E-mail list for product security notifications and announcements:

This Security Advisory is posted to the following lists:

security-announce at bugtraq at 
fulldisclosure at

E-mail: security at PGP key at:

VMware Security Advisories

VMware Security Response Policy

VMware Lifecycle Support Phases


Copyright 2014 VMware Inc. All rights reserved.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email:
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.