RSA response to Fox-IT report and Best Practices for RSA SecurID
Originally Published: 2020-01-14
Article Number
Applies To
CVE Identifier(s)
Article Summary
Resolution
- The adversary must have access to a software token XML file.
- The file must have been created without a password.
Important Statement from RSA Regarding RSA SecurID Software Token Provisioning Best Practices
Disclaimer
Related Articles
Best practices for using Data Access Governance (DAG) in RSA Identity Governance & Lifecycle 61Number of Views Best practices when using SCCM to deploy RSA DLP Endpoint Agent software updates 72Number of Views Best practices for RSA Authentication Manager 8.x 379Number of Views Best Practices to Mitigate Password-Spraying Attacks 331Number of Views RSA SecurID Authentication Engine Security Best Practices Guide (Japanese) 74Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory
Don't see what you're looking for?