Vulnerabilities > CVE-2013-0931 - Configuration vulnerability in RSA Authentication Agent for Windows 7.1/7.1.1

047910
CVSS 5.4 - MEDIUM
Attack vector
ADJACENT_NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL

Summary

EMC RSA Authentication Agent 7.1.x before 7.1.2 on Windows does not enforce the Quick PIN Unlock timeout feature, which allows physically proximate attackers to bypass the passcode requirement for a screensaved session by entering a PIN after timeout expiration. Per http://archives.neohapsis.com/archives/bugtraq/2013-03/att-0001/ESA-2013-012.txt "Affected Products: Product: RSA Authentication Agent for Microsoft Windows version 7.1 and 7.1.1 Platforms: Windows XP and Windows 2003"

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows
NASL idRSA_AUTHENTICATION_AGENT_7_1_2.NASL
descriptionThe version of RSA Authentication Agent installed on the remote Windows host is 7.1.x prior to 7.1.2. Such versions contain a flaw that may allow an attacker to bypass the passcode mechanism on systems configured with the Quick PIN unlock.
last seen2020-06-01
modified2020-06-02
plugin id69428
published2013-08-15
reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/69428
titleRSA Authentication Agent 7.1.x < 7.1.2 Authentication Bypass