ID CVE-2014-0646
Summary The runtime WS component in the server in EMC RSA Access Manager 6.1.3 before 6.1.3.39, 6.1.4 before 6.1.4.22, 6.2.0 before 6.2.0.11, and 6.2.1 before 6.2.1.03, when INFO logging is enabled, allows local users to discover cleartext passwords by reading log files.
References
Vulnerable Configurations
  • cpe:2.3:a:emc:rsa_access_manager:6.1:sp3:*:*:*:*:*:*
    cpe:2.3:a:emc:rsa_access_manager:6.1:sp3:*:*:*:*:*:*
  • cpe:2.3:a:emc:rsa_access_manager:6.1:sp4:*:*:*:*:*:*
    cpe:2.3:a:emc:rsa_access_manager:6.1:sp4:*:*:*:*:*:*
  • cpe:2.3:a:emc:rsa_access_manager:6.2:-:*:*:*:*:*:*
    cpe:2.3:a:emc:rsa_access_manager:6.2:-:*:*:*:*:*:*
  • cpe:2.3:a:emc:rsa_access_manager:6.2:sp1:*:*:*:*:*:*
    cpe:2.3:a:emc:rsa_access_manager:6.2:sp1:*:*:*:*:*:*
CVSS
Base: 6.9 (as of 02-05-2014 - 13:49)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bugtraq 20140430 ESA-2014-029: RSA Access Manager Sensitive Information Disclosure Vulnerability
Last major update 02-05-2014 - 13:49
Published 01-05-2014 - 17:29
Last modified 02-05-2014 - 13:49
Back to Top