Lucene search

K
openvasCopyright (C) 2013 Greenbone AGOPENVAS:1361412562310802059
HistoryAug 29, 2013 - 12:00 a.m.

EMC RSA Authentication Agent Access Control Bypass Vulnerability - Windows

2013-08-2900:00:00
Copyright (C) 2013 Greenbone AG
plugins.openvas.org
10

6.7 Medium

AI Score

Confidence

Low

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

71.7%

RSA Authentication Agent is prone to a security bypass vulnerability.

# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:emc:rsa_authentication_agent";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802059");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2012-2287");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"creation_date", value:"2013-08-29 12:11:58 +0530 (Thu, 29 Aug 2013)");
  script_name("EMC RSA Authentication Agent Access Control Bypass Vulnerability - Windows");


  script_tag(name:"summary", value:"RSA Authentication Agent is prone to a security bypass vulnerability.");
  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
  script_tag(name:"solution", value:"Upgrade to version 7.1.1 or later.");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"insight", value:"Flaw is due to unspecified configuration, allowing users to login with
Windows credentials, which can be exploited to bypass the RSA authentication
mechanism.");
  script_tag(name:"affected", value:"RSA Authentication Agent version 7.1 on Windows XP and Windows 2003");
  script_tag(name:"impact", value:"Successful exploitation will allow attacker to bypass intended token
authentication step and establish a login session to a remote host with
Windows credentials.");
  script_xref(name:"URL", value:"http://secunia.com/advisories/50735");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/55662");
  script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/78802");
  script_xref(name:"URL", value:"http://archives.neohapsis.com/archives/bugtraq/2012-09/att-0102/ESA-2012-037.txt");
  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"registry");
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_family("General");
  script_dependencies("gb_rsa_auth_agent_detect_win.nasl");
  script_mandatory_keys("RSA/AuthenticationAgent6432/Installed");
  script_xref(name:"URL", value:"http://www.rsa.com/node.aspx?id=2575");
  exit(0);
}


include("secpod_reg.inc");
include("host_details.inc");

if(hotfix_check_sp(xp:4, xpx64:3, win2003:3, win2003x64:3) <= 0){
  exit(0);
}

ras_auth_ver = get_app_version(cpe:CPE);

if(ras_auth_ver && ras_auth_ver == "7.1")
{
  security_message( port: 0, data: "The target host was found to be vulnerable" );
  exit(0);
}

6.7 Medium

AI Score

Confidence

Low

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

71.7%

Related for OPENVAS:1361412562310802059