Last Modified: Dec. 12, 2018
EMC RSA NetWitness before 9.8.5.19 and RSA Security Analytics before 10.2.4 and 10.3.x before 10.3.2, when Kerberos PAM is enabled, do not require a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid account name.
Access Vector: Network
Access Complexity: High
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Base Score: 7.6
Exploitability Score: 4.9
Impact Score: 10.0
CVSS V2: AV:N/AC:H/Au:N/C:C/I:C/A:C
CWE-287
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:emc:rsa_netwitness:*:*:*:*:*:*:*:* Part: a Vendor: emc | Alle Schwachstellen für emc | |
cpe:2.3:a:emc:rsa_security_analytics:*:*:*:*:*:*:*:* Part: a Vendor: emc | Alle Schwachstellen für emc | |
cpe:2.3:a:emc:rsa_security_analytics:*:*:*:*:*:*:*:* Part: a Vendor: emc | Alle Schwachstellen für emc |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:emc:rsa_netwitness:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:emc:rsa_security_analytics:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:emc:rsa_security_analytics:*:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="remote"/> <prop key="range" value="local"/> </set> </set>