First published: Fri May 01 2015(Updated: )
EMC RSA Identity Management and Governance (IMG) 6.9 before P04 and 6.9.1 before P01 does not properly restrict password resets, which allows remote attackers to obtain access via crafted use of the reset process for an arbitrary valid account name, as demonstrated by a privileged account.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA Identity Management and Governance | =6.9.0 | |
EMC RSA Identity Management and Governance | =6.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0532 is classified as a high severity vulnerability due to its potential to allow unauthorized access to accounts.
To fix CVE-2015-0532, upgrade EMC RSA Identity Management and Governance to version 6.9.0 P04 or 6.9.1 P01 or later.
CVE-2015-0532 affects all valid user accounts within EMC RSA Identity Management and Governance versions 6.9.0 and 6.9.1.
Yes, CVE-2015-0532 can be exploited remotely by an attacker utilizing the insecure password reset feature.
Exploiting CVE-2015-0532 may allow an attacker to gain unauthorized access to user accounts, potentially leading to data breaches.