EMC RSA Adaptive Authentication On-Premise (AAOP) 126.96.36.199 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not prevent reuse of authentication information during a session, which allows remote authenticated users to bypass intended access restrictions via vectors related to knowledge of the originally used authentication information and unspecified other session information.
CVSS Severity (version 2.0):
Impact Subscore: 8.5
Exploitability Subscore: 6.8
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Medium
Authentication: Required to exploit
Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service
We strongly recommend that RSA customers should obtain the following hot fixes:
RSA AAOP 188.8.131.52 SP1 Patch 2 customers should obtain Hotfix 430 from SecurCare Online.
RSA AAOP 184.108.40.206 SP1 Patch 3 customers should obtain Hotfix 130 from SecurCare Online.
RSA AAOP 220.127.116.11 SP2 customers should obtain Hotfix 360 from SecurCare Online.
RSA AAOP 18.104.22.168 SP2 Patch 1 customers should obtain Hotfix 140 from SecurCare Online.
RSA AAOP 22.214.171.124 SP3 customers should obtain Hotfix 130 from SecurCare Online.
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to firstname.lastname@example.org.
20110816 ESA-2011-027: RSA, The Security Division of EMC, releases Security Patch for Adaptive Authentication (On-Premise)