Affected Products:
· RSA Access Manager Server version 6.1 SP 3
· RSA Access Manager Server version 6.1 SP 4
· RSA Access Manager Server version 6.2
· RSA Access Manager Server version 6.2 SP 1
Unaffected Products:
· RSA Access manager Server version 6.1
· RSA Access Manager Server version 6.1 SP 1
· RSA Access Manager Server version 6.1 SP 2
· All supported RSA Access Manager Agent versions
Summary:
RSA Access Manager releases security fix to address a sensitive information disclosure vulnerability.
Details:
RSA Access Manager contains a security fix for sensitive information disclosure vulnerability where user passwords are potentially logged in plaintext within the log files of the runtime WS component. By default, the logging level is now set to ERROR, which is not affected by this vulnerability. This vulnerability only applies when the logging level is changed to INFO.
Recommendation:
RSA recommends that all customers running the RSA Access Manager Server versions 6.1 SP3, 6.1 SP4, 6.2 and 6.2 SP1 apply the security hot fixes listed below that contains the resolution for this issue.
For RSA Access Manager Server version 6.1 SP 3, apply security hot fix #AxM HF 6.1.3.39
For RSA Access Manager Server version 6.1 SP 4, apply security hot fix #AxM HF 6.1.4.22
For RSA Access Manager Server version 6.2, apply security hot fix #AxM HF 6.2.0.11
For RSA Access Manager Server version 6.2. SP 1, apply security hot fix #AxM HF 6.2.1.03
It is also recommended that customers change their passwords to mitigate from any possible exposure.
Obtaining Downloads:
To obtain the latest RSA product downloads, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose download you want to obtain. Scroll to the section for the product download that you want and click on the link.
Obtaining Documentation:
To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link.
Severity Rating:
For an explanation of Severity Ratings, refer to the Knowledge Base Article, “Security Advisories Severity Rating” at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Obtaining More Information:
For more information about RSA products, visit the RSA web site at http://www.rsa.com.
Getting Support and Service:
For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.
General Customer Support Information:
http://www.emc.com/support/rsa/index.htm
EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details.
http://www.emc.com/support/rsa/eops/index.htm
SecurCare Online Security Advisories
RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
About RSA SecurCare Notes & Security Advisories Subscription
RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you’d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you’d like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.
{"id": "SECURITYVULNS:DOC:30516", "bulletinFamily": "software", "title": "ESA-2014-029: RSA\u00ae Access Manager Sensitive Information Disclosure Vulnerability", "description": "\r\n\r\n\r\n\r\nESA-2014-029.txt\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nESA-2014-029: RSA\u00ae Access Manager Sensitive Information Disclosure Vulnerability\r\n\r\nEMC Identifier: ESA-2014-029\r\nCVE Identifier: CVE-2014-0646\r\nSeverity Rating: 6.6 (AV:L/AC:M/Au:S/C:C/I:C/A:C)\r\n \r\nAffected Products:\r\n\u00b7 RSA Access Manager Server version 6.1 SP 3\r\n\u00b7 RSA Access Manager Server version 6.1 SP 4\r\n\u00b7 RSA Access Manager Server version 6.2\r\n\u00b7 RSA Access Manager Server version 6.2 SP 1\r\n \r\nUnaffected Products:\r\n\u00b7 RSA Access manager Server version 6.1\r\n\u00b7 RSA Access Manager Server version 6.1 SP 1\r\n\u00b7 RSA Access Manager Server version 6.1 SP 2\r\n\u00b7 All supported RSA Access Manager Agent versions\r\n \r\nSummary: \r\nRSA Access Manager releases security fix to address a sensitive information disclosure vulnerability.\r\n \r\nDetails: \r\nRSA Access Manager contains a security fix for sensitive information disclosure vulnerability where user passwords are potentially logged in plaintext within the log files of the runtime WS component. By default, the logging level is now set to ERROR, which is not affected by this vulnerability. This vulnerability only applies when the logging level is changed to INFO.\r\n \r\nRecommendation:\r\nRSA recommends that all customers running the RSA Access Manager Server versions 6.1 SP3, 6.1 SP4, 6.2 and 6.2 SP1 apply the security hot fixes listed below that contains the resolution for this issue.\r\n \r\nFor RSA Access Manager Server version 6.1 SP 3, apply security hot fix #AxM HF 6.1.3.39\r\nFor RSA Access Manager Server version 6.1 SP 4, apply security hot fix #AxM HF 6.1.4.22\r\nFor RSA Access Manager Server version 6.2, apply security hot fix #AxM HF 6.2.0.11\r\nFor RSA Access Manager Server version 6.2. SP 1, apply security hot fix #AxM HF 6.2.1.03\r\n \r\nIt is also recommended that customers change their passwords to mitigate from any possible exposure. \r\n\r\nObtaining Downloads:\r\nTo obtain the latest RSA product downloads, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose download you want to obtain. Scroll to the section for the product download that you want and click on the link.\r\n\r\nObtaining Documentation:\r\nTo obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link.\r\n\r\nSeverity Rating:\r\nFor an explanation of Severity Ratings, refer to the Knowledge Base Article, \u201cSecurity Advisories Severity Rating\u201d at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.\r\n\r\nObtaining More Information:\r\nFor more information about RSA products, visit the RSA web site at http://www.rsa.com.\r\n\r\nGetting Support and Service:\r\nFor customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.\r\n\r\nGeneral Customer Support Information:\r\nhttp://www.emc.com/support/rsa/index.htm\r\n\r\nRSA SecurCare Online:\r\nhttps://knowledge.rsasecurity.com\r\n\r\nEOPS Policy:\r\nRSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details. \r\nhttp://www.emc.com/support/rsa/eops/index.htm\r\n\r\nSecurCare Online Security Advisories\r\nRSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\r\n\r\nAbout RSA SecurCare Notes & Security Advisories Subscription\r\nRSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you\u2019d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you\u2019d like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.\r\n\r\nSincerely,\r\nRSA Customer Support\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.13 (Cygwin)\r\n\r\niEYEARECAAYFAlNhJQUACgkQtjd2rKp+ALwzYwCdG7TUILJczw6QJZRacg7XDunB\r\n5WcAoKtlv+cYE7rnTN201HIZAIpOrXBK\r\n=YPYq\r\n-----END PGP SIGNATURE-----\r\n\r\n", "published": "2014-05-01T00:00:00", "modified": "2014-05-01T00:00:00", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30516", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2014-0646"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:51", "edition": 1, "viewCount": 6, "enchantments": {"score": {"value": 6.4, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-0646"]}, {"type": "nessus", "idList": ["EMC_RSA_ACCESS_MANAGER_ESA-2014-029.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:13694"]}], "rev": 4}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2014-0646"]}, {"type": "nessus", "idList": ["EMC_RSA_ACCESS_MANAGER_ESA-2014-029.NASL"]}]}, "exploitation": null, "vulnersScore": 6.4}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647175113}}
{"securityvulns": [{"lastseen": "2021-06-08T19:10:45", "bulletinFamily": "software", "cvelist": ["CVE-2014-0646"], "description": "Cleartext passwords may be logged.", "edition": 2, "modified": "2014-05-01T00:00:00", "published": "2014-05-01T00:00:00", "id": "SECURITYVULNS:VULN:13694", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13694", "title": "RSA Access Manager information leakage", "type": "securityvulns", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-08-19T12:50:22", "description": "The remote Windows host is running a version of EMC RSA Access Manager that is reportedly affected by an information disclosure vulnerability if the logging level is set to INFO. This could result in passwords being logged in plaintext.", "cvss3": {"score": 9.3, "vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}, "published": "2014-05-08T00:00:00", "type": "nessus", "title": "EMC RSA Access Manager Information Disclosure (ESA-2014-029)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0646"], "modified": "2019-02-26T00:00:00", "cpe": ["cpe:/a:emc:rsa_access_manager"], "id": "EMC_RSA_ACCESS_MANAGER_ESA-2014-029.NASL", "href": "https://www.tenable.com/plugins/nessus/73921", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(73921);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/02/26 4:50:09\");\n\n script_cve_id(\"CVE-2014-0646\");\n script_bugtraq_id(67172);\n\n script_name(english:\"EMC RSA Access Manager Information Disclosure (ESA-2014-029)\");\n script_summary(english:\"Checks EMC RSA Access Manager version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is potentially affected by an information disclosure\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is running a version of EMC RSA Access Manager\nthat is reportedly affected by an information disclosure vulnerability\nif the logging level is set to INFO. This could result in passwords\nbeing logged in plaintext.\");\n # https://seclists.org/bugtraq/2014/Apr/att-190/ESA-2014-029.txt\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b59f794b\");\n script_set_attribute(attribute:\"solution\", value:\"Refer to vendor advisory ESA-2014-029 for patch information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0646\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:emc:rsa_access_manager\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"emc_rsa_access_manager_installed.nbin\");\n script_require_keys(\"installed_sw/EMC RSA Access Manager\");\n script_require_ports(\"SMB/transport\", 139, 445);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\napp_name = \"EMC RSA Access Manager\";\nget_install_count(app_name:app_name, exit_if_zero:TRUE);\nfix = NULL;\n\n# Only 1 install of the server is possible.\ninstall = get_installs(app_name:app_name);\nif (install[0] == IF_NOT_FOUND) audit(AUDIT_NOT_INST, app_name);\ninstall = install[1][0];\n\nversion = install['version'];\npath = install['path'];\n\n# Determine fix if affected branch.\nif (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_APP_VER, app_name);\nelse if (version =~ \"^6\\.1\\.3(\\.|$)\") fix = \"6.1.3.39\";\nelse if (version =~ \"^6\\.1\\.4(\\.|$)\") fix = \"6.1.4.22\";\nelse if (version =~ \"^6\\.2(\\.0|$)\") fix = \"6.2.0.11\";\nelse if (version =~ \"^6\\.2\\.1(\\.|$)\") fix = \"6.2.1.03\";\n\nif (!isnull(fix) && ver_compare(ver:version, fix:fix, strict:FALSE) == -1)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_warning(extra:report, port:port);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T12:09:40", "description": "The runtime WS component in the server in EMC RSA Access Manager 6.1.3 before 6.1.3.39, 6.1.4 before 6.1.4.22, 6.2.0 before 6.2.0.11, and 6.2.1 before 6.2.1.03, when INFO logging is enabled, allows local users to discover cleartext passwords by reading log files.", "cvss3": {}, "published": "2014-05-01T17:29:00", "type": "cve", "title": "CVE-2014-0646", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0646"], "modified": "2014-05-02T13:49:00", "cpe": ["cpe:/a:emc:rsa_access_manager:6.2", "cpe:/a:emc:rsa_access_manager:6.1"], "id": "CVE-2014-0646", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0646", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:emc:rsa_access_manager:6.2:-:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_access_manager:6.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_access_manager:6.2:sp1:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_access_manager:6.1:sp3:*:*:*:*:*:*"]}]}