Security Update:VMWare Released Security Update to Address 2 Vulnerabilities in Airwatch
Date and Time
VMWare Airwatch Users
VMWare has released a security update to address 2 vulnerabilities in Airwatch.
Advanced Users: For a complete description of the security enhancements and affected software refer to VMware Security Advisory VMSA-2017-0001 (AirWatch updates address bypass of root detection and local data encryption) at http://lists.vmware.com/pipermail/security-announce/2017/000363.html.
- Airwatch Agent
- Airwatch Console
- AirWatch Inbox
WHAT'S THE PROBLEM?
Successful exploitation of this issue may result in an enrolled device having unrestricted access over local Airwatch security controls and data.
HOW DO I PROTECT MY COMPUTER?
VMware recommends customers to review the patch/release notes for your product and version and verify the checksum of your downloaded file.
- If you are supported by ITFS or have different IT support, no action on your part is required.
- If you do not have IT support, updates may be obtained through VMware Security Advisory VMSA-2017-0001 (AirWatch updates address bypass of root detection and local data encryption) at http://lists.vmware.com/pipermail/security-announce/2017/000363.html.
- VMware Security Updates at http://www.vmware.com/security/advisories.html
IT Security at http://it.ucsf.edu/security