ID CVE-2011-2736
Summary RSA enVision 4.x before 4 SP4 P3 places cleartext administrative credentials in Task Escalation e-mail messages, which allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox.
References
Vulnerable Configurations
  • cpe:2.3:a:rsa:envision:4.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:rsa:envision:4.0:sp1:*:*:*:*:*:*
  • cpe:2.3:a:rsa:envision:4.0:sp2:*:*:*:*:*:*
    cpe:2.3:a:rsa:envision:4.0:sp2:*:*:*:*:*:*
  • cpe:2.3:a:rsa:envision:4.0:sp3:*:*:*:*:*:*
    cpe:2.3:a:rsa:envision:4.0:sp3:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-10-2018 - 19:32)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bugtraq 20110823 ESA-2011-030: RSA, The Security Division of EMC, announces security fixes for RSA enVision
sectrack 1025979
sreason 8350
Last major update 09-10-2018 - 19:32
Published 25-08-2011 - 14:22
Last modified 09-10-2018 - 19:32
Back to Top