First published: Tue Sep 26 2006(Updated: )
RSA Keon Certificate Authority (KeonCA) Manager 6.5.1 and 6.6 allows privileged local users to hide malicious Certificate Authority (CA) activities by modifying CA auditor logs without detection by (1) modifying or deleting a <LOG BLOCK> and its signature from the XML log in a way that is not detected by the integrity check function that operates on the entire pool, or (2) modifying entries in the live log file, which is only signed during rotation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Keon Certificate Authority Manager | =6.5.1 | |
RSA Keon Certificate Authority Manager | =6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4991 is classified as a high severity vulnerability due to the potential for privileged local users to manipulate Certificate Authority logs.
To mitigate CVE-2006-4991, ensure that your RSA Keon Certificate Authority Manager is updated to a subsequent version that addresses this vulnerability.
Users of RSA Keon Certificate Authority Manager versions 6.5.1 and 6.6 are specifically affected by CVE-2006-4991.
CVE-2006-4991 allows privileged local users to hide malicious Certificate Authority activities by modifying or deleting auditor logs.
The consequences of CVE-2006-4991 include unauthorized certificate issuance and undetected malicious activities in a Certificate Authority environment.