The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rsa_identity_governance_and_lifecycle | Dell | 7.0 (including) | 7.0 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.0.1 (including) | 7.0.1 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.0.2 (including) | 7.0.2 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0 (including) | 7.1.0 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p01 (including) | 7.1.0-p01 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p02 (including) | 7.1.0-p02 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p03 (including) | 7.1.0-p03 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p04 (including) | 7.1.0-p04 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p05 (including) | 7.1.0-p05 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p06 (including) | 7.1.0-p06 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p07 (including) | 7.1.0-p07 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.0-p08 (including) | 7.1.0-p08 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.1 (including) | 7.1.1 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.1-p01 (including) | 7.1.1-p01 (including) |
Rsa_identity_governance_and_lifecycle | Dell | 7.1.1-p02 (including) | 7.1.1-p02 (including) |
As data is migrated to the cloud, if access does not require authentication, it can be easier for attackers to access the data from anywhere on the Internet.