Remote Java JMX agent is configured without SSL client and password authentication in RSA Governance & Lifecycle
Article Number
Applies To
- RSA Governance & Lifecycle 8.0.0 P03 HF01 and later
Article Summary
A security vulnerability was identified in the AFX module related to the insecure configuration of the Java JMX agent. Specifically, the JMX agent was running without SSL and password authentication, potentially allowing unauthenticated remote access for monitoring or management, and posing a risk of remote code execution.
Link to Advisories
Alert Impact
Not Applicable
Alert Impact Explanation
In RSA Governance & Lifecycle 8.0.0 GA through 8.0.0 P03:
- The JMX and broker services within ActiveMQ were originally configured without secure authentication.
- In earlier implementation, the files jmx.access and jmx.password were used for JMX authentication, but these stored credentials in clear text, which posed a security risk.
In RSA Governance & Lifecycle 8.0.0 P03 HF01 and later:
As part of the resolution:
- ActiveMQ has been upgraded to version 5.16.x, eliminating the insecure configuration of both the broker and JMX services.
- SSL-based communication has been enabled for all JMX connections, replacing username/password-based authentication.
- The files jmx.access and jmx.password remain on the system for internal technical reasons, but:
- They are non-functional dummy files.
- The application does not use or rely on them in any way.
- Their presence does not pose a security risk.
Resolution
Any vulnerability scans that flag the presence of jmx.access or jmx.password in RSA Governance & Lifecycle 8.0.0 P03 HF01 or later, can be safely considered false positives. These files are inert and retained solely for compatibility purposes.
Disclaimer
Related Articles
Role membership rules configured in the RSA Identity Governance & Lifecycle's Role UI do not create rules when no checkbox… 48Number of Views Generic REST Collector fails with 'com.aveksa.client.genericrest.GenericRestException: UNEVEN_JSON_PATH_CONFIGURATION' in … 272Number of Views "Invalid authentication handle" reported by the Cisco AnyConnect client when using RSA SecurID Access Cloud Authentication… 232Number of Views Allow a large number of RADIUS clients to authenticate without adding an agent for each client in RSA Authentication Manag… 308Number of Views RSA Authentication Manager 8.2 Multiple Vulnerabilities - False Positive 58Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to…
Don't see what you're looking for?