First published: Thu Aug 18 2011(Updated: )
EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not prevent reuse of authentication information during a session, which allows remote authenticated users to bypass intended access restrictions via vectors related to knowledge of the originally used authentication information and unspecified other session information.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Adaptive Authentication | =6.0.2.1-sp1_patch3 | |
RSA Adaptive Authentication | =6.0.2.1-sp2_patch1 | |
RSA Adaptive Authentication | =6.0.2.1-sp3 | |
RSA Adaptive Authentication | =6.0.2.1-sp1_patch2 | |
RSA Adaptive Authentication | =6.0.2.1-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2733 is considered a critical vulnerability due to its potential to allow authenticated users to bypass access restrictions.
To fix CVE-2011-2733, upgrade to a patched version of EMC RSA Adaptive Authentication On-Premise that addresses this vulnerability.
CVE-2011-2733 affects users of specific versions of EMC RSA Adaptive Authentication On-Premise, including 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3.
The risks associated with CVE-2011-2733 include unauthorized access to sensitive information and resources due to session authentication bypass.
Yes, CVE-2011-2733 can be exploited remotely by authenticated users who know specific information related to the session.