Vulnerabilities > CVE-2014-0646 - Cryptographic Issues vulnerability in EMC RSA Access Manager 6.1/6.2

047910
CVSS 6.9 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
emc
CWE-310
nessus

Summary

The runtime WS component in the server in EMC RSA Access Manager 6.1.3 before 6.1.3.39, 6.1.4 before 6.1.4.22, 6.2.0 before 6.2.0.11, and 6.2.1 before 6.2.1.03, when INFO logging is enabled, allows local users to discover cleartext passwords by reading log files.

Vulnerable Configurations

Part Description Count
Application
Emc
4

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

NASL familyWindows
NASL idEMC_RSA_ACCESS_MANAGER_ESA-2014-029.NASL
descriptionThe remote Windows host is running a version of EMC RSA Access Manager that is reportedly affected by an information disclosure vulnerability if the logging level is set to INFO. This could result in passwords being logged in plaintext.
last seen2020-06-01
modified2020-06-02
plugin id73921
published2014-05-08
reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/73921
titleEMC RSA Access Manager Information Disclosure (ESA-2014-029)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(73921);
  script_version("1.9");
  script_cvs_date("Date: 2019/02/26  4:50:09");

  script_cve_id("CVE-2014-0646");
  script_bugtraq_id(67172);

  script_name(english:"EMC RSA Access Manager Information Disclosure (ESA-2014-029)");
  script_summary(english:"Checks EMC RSA Access Manager version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is potentially affected by an information disclosure
vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host is running a version of EMC RSA Access Manager
that is reportedly affected by an information disclosure vulnerability
if the logging level is set to INFO. This could result in passwords
being logged in plaintext.");
  # https://seclists.org/bugtraq/2014/Apr/att-190/ESA-2014-029.txt
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b59f794b");
  script_set_attribute(attribute:"solution", value:"Refer to vendor advisory ESA-2014-029 for patch information.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0646");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/30");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/04/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/05/08");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:emc:rsa_access_manager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("emc_rsa_access_manager_installed.nbin");
  script_require_keys("installed_sw/EMC RSA Access Manager");
  script_require_ports("SMB/transport", 139, 445);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app_name = "EMC RSA Access Manager";
get_install_count(app_name:app_name, exit_if_zero:TRUE);
fix = NULL;

# Only 1 install of the server is possible.
install = get_installs(app_name:app_name);
if (install[0] == IF_NOT_FOUND) audit(AUDIT_NOT_INST, app_name);
install = install[1][0];

version = install['version'];
path = install['path'];

# Determine fix if affected branch.
if (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_APP_VER, app_name);
else if (version =~ "^6\.1\.3(\.|$)") fix = "6.1.3.39";
else if (version =~ "^6\.1\.4(\.|$)") fix = "6.1.4.22";
else if (version =~ "^6\.2(\.0|$)") fix = "6.2.0.11";
else if (version =~ "^6\.2\.1(\.|$)") fix = "6.2.1.03";

if (!isnull(fix) && ver_compare(ver:version, fix:fix, strict:FALSE) == -1)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fix +
      '\n';
    security_warning(extra:report, port:port);
  }
  else security_warning(port);
  exit(0);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);