First published: Fri Jul 07 2017(Updated: )
EMC RSA Archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is affected by an open redirect vulnerability. A remote unprivileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the RSA Archer application without the victims realizing an attack occurred.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA Archer | =5.4.1.3 | |
EMC RSA Archer | =5.5.1.1 | |
EMC RSA Archer | =5.5.1.3.1 | |
EMC RSA Archer | =5.5.2 | |
EMC RSA Archer | =5.5.2.3 | |
EMC RSA Archer | =5.5.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5002 is characterized as a medium severity vulnerability due to its potential to enable phishing attacks through open redirects.
To fix CVE-2017-5002, update to a patched version of EMC RSA Archer that addresses the open redirect vulnerability.
CVE-2017-5002 affects EMC RSA Archer versions 5.4.1.3, 5.5.1.1, 5.5.1.3.1, 5.5.2, 5.5.2.3, and 5.5.3.1.
CVE-2017-5002 can facilitate phishing attacks by allowing an attacker to redirect users to malicious websites.
While CVE-2017-5002 itself does not directly allow unauthorized access, it can enable attackers to steal credentials through phishing.