RSA Identifier
RSA-2021-06
CVE Identifier
See Advisory
Severity
Critical
Severity Rating
See NVD (http://nvd.nist.gov/home.cfm) for individual scores for each CVE
Affected Products
- RSA Identity Governance and Lifecycle (Hardware Appliance and Virtual Application deployments only)
- RSA Via Lifecycle and Governance Lifecycle (Hardware Appliance deployments only)
- RSA IMG Lifecycle (Hardware Appliance deployments only)
Note: - The latest patches affect the hardware Appliance and Virtual Application deployments with an RSA supplied SUSE Linux Enterprise Server 12 SP5 operating system. For those customers currently using SUSE Linux Enterprise Server 12 SP4 the updater will update you to SUSE Linux Enterprise Server 12 SP5 with all the latest patches.
Unaffected Products:
- RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, and RSA IMG:
Software-only systems or any deployment where RSA did not supply the operating system.
Summary
The embedded operating system components in RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, and RSA IMG require a security update to address various vulnerabilities.
Details
RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, and RSA IMG have been updated to address the following security vulnerabilities.
SUSE Linux Enterprise Server 12 SP5 OS Updates
|
CVE-2017-18926 |
CVE-2019-17437 |
CVE-2019-19906 |
CVE-2019-20916 |
CVE-2019-20916 |
|
CVE-2019-20934 |
CVE-2020-0404 |
CVE-2020-0427 |
CVE-2020-0430 |
CVE-2020-0431 |
|
CVE-2020-0432 |
CVE-2020-0444 |
CVE-2020-0465 |
CVE-2020-0466 |
CVE-2020-0499 |
|
CVE-2020-0556 |
CVE-2020-1971 |
CVE-2020-2521 |
CVE-2020-4788 |
CVE-2020-8625 |
|
CVE-2020-8694 |
CVE-2020-12351 |
CVE-2020-12352 |
CVE-2020-13987 |
CVE-2020-13988 |
|
CVE-2020-14145 |
CVE-2020-14318 |
CVE-2020-14323 |
CVE-2020-14351 |
CVE-2020-14360 |
|
CVE-2020-14363 |
CVE-2020-14372 |
CVE-2020-14381 |
CVE-2020-14383 |
CVE-2020-14390 |
|
CVE-2020-14803 |
CVE-2020-15436 |
CVE-2020-15437 |
CVE-2020-15683 |
CVE-2020-15969 |
|
CVE-2020-15999 |
CVE-2020-15999 |
CVE-2020-16012 |
CVE-2020-16042 |
CVE-2020-16044 |
|
CVE-2020-16120 |
CVE-2020-16125 |
CVE-2020-17437 |
CVE-2020-17438 |
CVE-2020-25211 |
|
CVE-2020-25212 |
CVE-2020-25219 |
CVE-2020-25284 |
CVE-2020-25285 |
CVE-2020-25632 |
|
CVE-2020-25639 |
CVE-2020-25641 |
CVE-2020-25643 |
CVE-2020-25645 |
CVE-2020-25647 |
|
CVE-2020-25656 |
CVE-2020-25659 |
CVE-2020-25668 |
CVE-2020-25669 |
CVE-2020-25692 |
|
CVE-2020-25704 |
CVE-2020-25705 |
CVE-2020-25712 |
CVE-2020-26088 |
CVE-2020-26117 |
|
CVE-2020-26154 |
CVE-2020-26950 |
CVE-2020-26951 |
CVE-2020-26953 |
CVE-2020-26956 |
|
CVE-2020-26959 |
CVE-2020-26960 |
CVE-2020-26961 |
CVE-2020-26965 |
CVE-2020-26966 |
|
CVE-2020-26968 |
CVE-2020-26971 |
CVE-2020-26973 |
CVE-2020-26974 |
CVE-2020-26976 |
|
CVE-2020-26978 |
CVE-2020-27068 |
CVE-2020-27673 |
CVE-2020-27675 |
CVE-2020-27749 |
|
CVE-2020-27777 |
CVE-2020-27779 |
CVE-2020-27786 |
CVE-2020-27825 |
CVE-2020-27828 |
|
CVE-2020-27828 |
CVE-2020-27835 |
CVE-2020-28196 |
CVE-2020-28374 |
CVE-2020-28896 |
|
CVE-2020-28915 |
CVE-2020-28974 |
CVE-2020-29368 |
CVE-2020-29371 |
CVE-2020-29374 |
|
CVE-2020-29568 |
CVE-2020-29569 |
CVE-2020-29660 |
CVE-2020-29661 |
CVE-2020-35111 |
|
CVE-2020-35112 |
CVE-2020-35113 |
CVE-2020-36158 |
CVE-2020-36221 |
CVE-2020-36222 |
|
CVE-2020-36223 |
CVE-2020-36224 |
CVE-2020-36225 |
CVE-2020-36226 |
CVE-2020-36227 |
|
CVE-2020-36228 |
CVE-2020-36229 |
CVE-2020-36230 |
CVE-2020-36242 |
CVE-2021-3156 |
|
CVE-2021-3156 |
CVE-2021-3177 |
CVE-2021-3272 |
CVE-2021-3272 |
CVE-2021-3347 |
|
CVE-2021-3348 |
CVE-2021-20225 |
CVE-2021-20233 |
CVE-2021-23239 |
CVE-2021-23240 |
|
CVE-2021-23840 |
CVE-2021-23841 |
CVE-2021-23953 |
CVE-2021-23954 |
CVE-2021-23960 |
|
CVE-2021-23964 |
CVE-2021-23968 |
CVE-2021-23969 |
CVE-2021-23973 |
CVE-2021-23978 |
|
CVE-2021-26930 |
CVE-2021-26931 |
CVE-2021-26932 |
CVE-2021-26937 |
CVE-2021-27212 |
Note - For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a CVE, use the database's search utility at http://web.nvd.nist.gov/view/vuln/search.
Recommendation
The Appliance Updater tool's March 2021 releases will resolve these issues and ensures that the embedded OS components are kept current with security updates and patches.
RSA recommends all appliance customers who are on SUSE Linux Enterprise Server 12 SP4/SP5 to run the appliance updater as latest patches will be applied to the current installation.
This Appliance Updater supports the RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, or RSA IMG products which use an RSA supplied SUSE Linux Enterprise Server 12 SP4/SP5 operating system.
Customers can obtain the documentation and software by downloading them from the Downloads area on RSA Identity Governance and Lifecycle space of RSA Link.
- RSA Identity Governance and Lifecycle: RSA Identity Governance and Lifecycle Appliance Updater
- RSA Via L&G: RSA Via Lifecycle and Governance Appliance Updater
- RSA IMG: RSA Identity Management and Governance Appliance Updater
Severity Rating
For an explanation of Severity Ratings, refer to the RSA Vulnerability Disclosure Policy. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
EOPS Policy
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the Product Version Life Cycle for additional details.
Legal Information
Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact RSA Customer Support. RSA Security LLC and its affiliates distribute RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information.
RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement.
In no event shall RSA, its affiliates or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or its suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
Related Articles
RSA-2023-11: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities 53Number of Views RSA-2023-14: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities 156Number of Views DSA-2020-034: RSA Identity Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities 25Number of Views RSA-2023-08: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities 37Number of Views RSA-2023-05: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities 43Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x