Remote Java JMX agent is configured without SSL client and password authentication in RSA Governance & Lifecycle
Article Number
Applies To
- RSA Governance & Lifecycle 8.0.0 P03 HF01 and later
Article Summary
A security vulnerability was identified in the AFX module related to the insecure configuration of the Java JMX agent. Specifically, the JMX agent was running without SSL and password authentication, potentially allowing unauthenticated remote access for monitoring or management, and posing a risk of remote code execution.
Link to Advisories
Alert Impact
Not Applicable
Alert Impact Explanation
In RSA Governance & Lifecycle 8.0.0 GA through 8.0.0 P03:
- The JMX and broker services within ActiveMQ were originally configured without secure authentication.
- In earlier implementation, the files jmx.access and jmx.password were used for JMX authentication, but these stored credentials in clear text, which posed a security risk.
In RSA Governance & Lifecycle 8.0.0 P03 HF01 and later:
As part of the resolution:
- ActiveMQ has been upgraded to version 5.16.x, eliminating the insecure configuration of both the broker and JMX services.
- SSL-based communication has been enabled for all JMX connections, replacing username/password-based authentication.
- The files jmx.access and jmx.password remain on the system for internal technical reasons, but:
- They are non-functional dummy files.
- The application does not use or rely on them in any way.
- Their presence does not pose a security risk.
Resolution
Any vulnerability scans that flag the presence of jmx.access or jmx.password in RSA Governance & Lifecycle 8.0.0 P03 HF01 or later, can be safely considered false positives. These files are inert and retained solely for compatibility purposes.
Disclaimer
Related Articles
BeyondTrust Password Safe - RADIUS Configuration in Authentication Manager - RSA Ready Implementation Guide 4Number of Views Allow a large number of RADIUS clients to authenticate without adding an agent for each client in RSA Authentication Manag… 309Number of Views Role membership rules configured in the RSA Identity Governance & Lifecycle's Role UI do not create rules when no checkbox… 51Number of Views Testing Your Risk-Based Authentication Integration 13Number of Views Explanation of product filtering in Lea client connections and its usage to filter checkpoint logs 64Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?