RSA Authentication Manager 8.2 False Positive Security Vulnerabilities
3 years ago
Originally Published: 2017-04-20
Article Number
000064256
Applies To
RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.2
CVE Identifier(s)
CVE-2016-9318,CVE-2016-9310,CVE-2015-7871,CVE-2015-5191,CVE-2016-7056,CVE-2016-8610,CVE-2016-7426,CVE-2016-5300,CVE-2016-8858
Article Summary
This article provides a list of security vulnerabilities that cannot be exploited on RSA Authentication Manager 8.2, but which may be flagged by security scanners.
Alert Impact
Not Applicable
Alert Impact Explanation
False Positive
Resolution
The vulnerabilities listed in the table below are in order by the date on which RSA Authentication Manager Engineering determined that the Authentication Manager 8.2 was not vulnerable.
Embedded ComponentCVE IDSummary of VulnerabilityReason why Product is not VulnerableDate Determined False Positive
libxml2CVE-2016-9318CVE-2016-9318Response: The flaw exists but cannot be exploited.14-Apr-17
  
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.Products which use this broken feature are not included in the RSA Authentication Manager appliance for handling any XML input from the AM consoles.
  
CVSS v3 Base Score: 7.8 High 
ntpCVE-2016-9310CVE-2016-9310Response: The flaw does not exist14-Apr-17
  
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.The NTP service on the RSA Authentication Manager appliance is a client of a time service only. It does not allow remote administration.
  
CVSS v3 Base Score: 6.5 Medium 
ntpCVE-2015-7871CVE-2015-7871Response: The flaw does not exist.14-Apr-17
  
Crypto-NAK packets can be used to cause ntpd to accept time from unauthenticated ephemeral symmetric peers by bypassing the authentication required to mobilize peer associations. This vulnerability appears to have been introduced in ntp-4.2.5p186 when the code handling mobilization of new passive symmetric associations (lines 1103-1165) was refactored.The RSA Authentication Manager appliance v8.2.0.4 already includes this fix
  
CVSS v2 Base Score: 6.4 Medium (from NTP.org) 
libvmtools0CVE-2015-5191CVE-2015-5191Response: The flaw exists but does not additional risk.14-Apr-17
  
No description at NVDThe RSA Authentication Manager appliance is a secure system with a single appliance administrator capable of logging in. It is not a multi-purpose/multi-user system with non-privileged local users. The appliance administrator is already capable of obtaining root privileges.
  
CVSS v2 Base Score: 6.56 Medium (from SUSE) 
opensslCVE-2016-7056CVE-2016-7056Response: The flaw exists but does not additional risk.14-Apr-17
  
The signing function in crypto/ecdsa/ecdsa_ossl.c in certain OpenSSL versions and forks is vulnerable to timing attacks when signing with the standardized elliptic curve P-256 despite featuring constant-time curve operations and modular inversion. A software defect omits setting the BN_FLG_CONSTTIME flag for nonces, failing to take a secure code path in the BN_mod_inverse method and therefore resulting in a cache-timing attack vulnerability. A malicious user with local access can recover ECDSA P-256 private keys.The RSA Authentication Manager appliance is a secure system with a single appliance administrator capable of logging in. It is not a multi-purpose/multi-user system with non-privileged local users. The appliance administrator is already capable of obtaining root privileges.
  
In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw. 
  
CVSS v3 Base Score: 5.5 Medium (from Red Hat) 
opensslCVE-2016-8610CVE-2016-8610Response: The flaw exists but cannot be exploited (in the default configuration)14-Apr-17
  
A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.OpenSSL is not used for SSL/TLS communication except in a special situation where the administrator has explicitly created database-read-only users and identified the source IP for the database read-only connection. The specified IP would need to be an IP controlled by the attacker. Any exploit would be further mitigated by the fact that the database connection is handled in separate threads (refer to https://access.redhat.com/security/cve/CVE-2016-8610).
  
CVSS v3 Base Score: 4.6 Medium (from Red Hat) 
ntpCVE-2016-7426CVE-2016-7426Response: The flaw exists but cannot be exploited.14-Apr-17
  
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.The RSA Authentication Manager appliance is not configured to use this rate limiting feature.
  
CVSS v3 Base Score: 5.3 Medium 
expatCVE-2016-5300CVE-2016-5300Response: The flaw exists but cannot be exploited.14-Apr-17
  
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.AM does not use the system Expat library for processing any input XML documents.
  
CVSS v3 Base Score: 7.5 High 
sshCVE-2016-8858CVE-2016-8858Response: The flaw exists but cannot be exploited (in the default configuration)14-Apr-17
  
CVSS v3 Base Score: 7.5 HighThe issue could be exploited by a user with access to SSH if the SSH capability of the AM appliance is enabled. The SSH console feature is not enabled by default and in included with AM for customers who are willing to accept its risks. RSA suggests that SSH access always be protected in a network limited to trusted administrators, and that the feature be disable when not being used.
Disclaimer
Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Software Technical Support at 1- 800 995 5095. RSA Security LLC and its affiliates, including without limitation, its ultimate parent company, EMC Corporation, distributes RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall RSA, its affiliates or suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.