CERT/CC Vulnerability Note VU#475445: Potential Impact on RSA Products
Originally Published: 2018-03-15
Article Number
Applies To
CVE Identifier(s)
Article Summary
Resolution
| RSA Product Name | Versions | Impacted? | Details | Last Updated |
|---|---|---|---|---|
| Access Manager | 6.2.x | Not Impacted | Access Manager supports SAML as an Identity Provider (IDP) and therefore is not impacted by the vulnerability. To prevent attackers from attempting or exploiting the vulnerability in your applications that may talk to a vulnerable third-party SP implementation, RSA recommends that you: 1. Ensure that accounts in your identity source can only be created by authorized individuals and, especially if any self-service account provisioning is offered, that account names adhere to specific guidelines to reduce the opportunity for exploitation. 2. Reach out to your SP application providers and make sure they use non-vulnerable SAML products or libraries, or confirm they are using the latest versions that have been patched to address the vulnerability. | 2018-03-15 |
| Adaptive Authentication Cloud | Not Impacted | The SAML implementation used is not affected by the vulnerability. | 2018-03-15 | |
| Archer Hosted | All Supported | Not Impacted | SAML responses and claims are handled by Microsoft ADFS which is not affected by the vulnerability. | 2018-03-15 |
| Archer Platform | All Supported | Not Impacted | SAML responses and claims are handled by Microsoft ADFS which is not affected by the vulnerability. | 2018-03-15 |
| Archer Security Operations Management (SecOps) | All Supported | Not Impacted | SAML responses and claims are handled by Microsoft ADFS which is not affected by the vulnerability. | 2018-03-15 |
| Archer Vulnerability & Risk Manager (VRM) | All Supported | Not Impacted | SAML responses and claims are handled by Microsoft ADFS which is not affected by the vulnerability. | 2018-03-15 |
| Federated Identity Manager (FIM) | All Supported | Not Impacted | FIM is not impacted by the vulnerability. FIM has signature verification procedure wherein any signed SAML response/assertion if modified (e.g., injection of any comments as stated in reported SAML vulnerability definition) would result in signature verification failure. RSA recommends that customers follow the product documentation to use signing and/or encryption for SAML messages. | 2018-03-15 |
| Identity Governance & Lifecycle, Via Lifecycle & Governance, Identity Management & Governance | 7.1, 7.0.2, 7.0.1, 7.0, 6.9.x | Not Impacted | Product uses libraries which are not affected by the vulnerability. | 2018-03-15 |
| SecurID Access Cloud Service | All Supported | Not Impacted | SecurID Access Cloud Service supports SAML as an Identity Provider (IDP) and therefore is not impacted by the vulnerability. To prevent attackers from attempting or exploiting the vulnerability in your applications that may talk to a vulnerable third-party SP implementation, RSA recommends that you: 1. Ensure that accounts in your identity source can only be created by authorized individuals and, especially if any self-service account provisioning is offered, that account names adhere to specific guidelines to reduce the opportunity for exploitation. 2. Reach out to your SP application providers and make sure they use non-vulnerable SAML products or libraries, or confirm they are using the latest versions that have been patched to address the vulnerability. | 2018-03-15 |
| SecurID Access IDR VM | All Supported | Not Impacted | SecurID Access IDR VM supports SAML as an Identity Provider (IDP) and as a Service Provider (SP). SecurID Access uses a SAML implementation that is not affected by the vulnerability. To prevent attackers from attempting or exploiting the vulnerability in your applications that may talk to a vulnerable third-party SP implementation, RSA recommends that you: 1. Ensure that accounts in your identity source can only be created by authorized individuals and, especially if any self-service account provisioning is offered, that account names adhere to specific guidelines to reduce the opportunity for exploitation. 2. Reach out to your SP application providers and make sure they use non-vulnerable SAML products or libraries, or confirm they are using the latest versions that have been patched to address the vulnerability. | 2018-03-15 |
Notes
- CERT/CC Vulnerability Note: https://www.kb.cert.org/vuls/id/475445
- Researcher’s (Duo Labs) blog post: https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations
Disclaimer
Related Articles
CERT/CC Vulnerability Note VU#144389: Potential Impact on RSA Products 199Number of Views Apache vulnerability 'Apache HTTP Server mod_rewrite' from scan 50Number of Views RSA Authentication Manager Multiple Vulnerabilities in PostgreSQL - False Positive 88Number of Views DSA-2019-015: RSA Identity Governance and Lifecycle Security Update for Apache Commons 2Number of Views RSA Authentication Manager 8.x Multiple Vulnerabilities in ISC BIND - False Positive 20Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?