1. Home
  2. Web App Vulnerabilities
  3. How to remediate – Workspace ONE API Settings

How to remediate – Workspace ONE API Settings

1. Introduction

The Workspace ONE API Settings plugin configures the Web API for Workspace ONE checks. This involves setting credentials used for these checks, which if misconfigured could allow unauthorised access to your Workspace ONE environment. Affected systems are typically those using VMware Workspace ONE for endpoint management and related services. A compromise of these settings can lead to data breaches, service disruption, or unauthorized control of managed devices.

2. Technical Explanation

The vulnerability stems from the initialisation of credentials used by checks performed via the Web API. Incorrectly configured or default credentials create a security risk. An attacker could potentially exploit this to gain access to sensitive information and manage Workspace ONE resources. The precondition for exploitation is having knowledge of, or being able to discover, these credentials.

  • Root cause: Missing or weak credential configuration during initial setup of the Web API checks.
  • Scope: VMware Workspace ONE environments utilising the Web API for checks are affected. Specific versions aren’t explicitly stated in available information.

3. Detection and Assessment

Confirming vulnerability involves checking the configuration of your scan policy settings. A quick check is to review recent changes made to these policies. A thorough method is to examine the credentials configured for Web API checks within each scan policy.

  • Quick checks: Review the modification history of scan policies in the Workspace ONE console, looking for changes related to ‘Preferences’ or API settings.
  • Scanning: There are no specific signature IDs known at this time. Security scanners focused on VMware products may provide relevant alerts if configured correctly.
  • Logs and evidence: Examine audit logs within the Workspace ONE environment for any modifications made to scan policy credentials. Look for events related to updating API settings.

4. Solution / Remediation Steps

The following steps detail how to correctly configure your Workspace ONE Web API credentials. These steps should be performed during scan policy configuration or updates.

4.1 Preparation

  • A standard change window may be appropriate, depending on your organisation’s procedures. Approval from a security team lead might be required.

4.2 Implementation

  1. Step 1: Log in to the Workspace ONE console as an administrator.
  2. Step 2: Navigate to ‘Policies’ and select the scan policy you wish to configure.
  3. Step 3: Go to the ‘Preferences’ section of the policy settings.
  4. Step 4: Enter strong, unique credentials for the Web API checks. Avoid using default or easily guessable passwords.
  5. Step 5: Save the changes to the scan policy.

4.3 Config or Code Example

Before

After

4.4 Security Practices Relevant to This Vulnerability

Several security practices can help prevent issues related to API credential management. Least privilege is important to limit the impact of compromised credentials. Strong password policies and regular rotation are also crucial.

  • Practice 1: Implement least privilege principles, granting only necessary access rights to accounts used for Web API checks.
  • Practice 2: Enforce strong password policies with minimum length, complexity requirements, and regular password changes.

4.5 Automation (Optional)

5. Verification / Validation

Confirm the fix by verifying that strong credentials are configured in your scan policies. Re-run the earlier detection method to ensure no default or weak credentials remain. Perform a basic service smoke test to confirm functionality.

  • Post-fix check: Log into the Workspace ONE console and verify the ‘Preferences’ section of the affected scan policy displays strong, non-default credentials.
  • Re-test: Review the modification history of scan policies again; there should be no further changes related to weak or default API settings.
  • Smoke test: Run a standard device compliance scan using the updated policy to confirm that checks are functioning correctly.
  • Monitoring: Monitor audit logs for any attempts to modify scan policy credentials without authorisation.

6. Preventive Measures and Monitoring

Regularly review security baselines and policies related to API credential management. Incorporate checks into your CI/CD pipelines to prevent the deployment of misconfigured scan policies. Implement a sensible patch or configuration review cycle.

  • Baselines: Update your VMware Workspace ONE security baseline to include requirements for strong API credentials.
  • Asset and patch process: Implement a quarterly configuration review cycle for all scan policies, focusing on credential settings.

7. Risks, Side Effects, and Roll Back

Incorrectly configured credentials can lead to service disruption or inaccurate compliance reporting. A roll back involves restoring the backed-up scan policy.

  • Risk or side effect 1: Incorrect credentials may prevent Web API checks from functioning correctly, leading to inaccurate compliance data.
  • Risk or side effect 2: Service interruption if incorrect credentials cause authentication failures.

8. References and Resources

Updated on October 26, 2025

Was this article helpful?

Related Articles