First published: Fri Jul 13 2018(Updated: )
RSA Identity Lifecycle and Governance versions 7.0.1, 7.0.2 and 7.1.0 contains an authorization bypass vulnerability within the workflow architect component (ACM). A remote authenticated malicious user with non-admin privileges could potentially bypass the Java Security Policies. Once bypassed, a malicious user could potentially run arbitrary system commands at the OS level with application owner privileges on the affected system.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA Identity Governance and Lifecycle | =7.0.1 | |
EMC RSA Identity Governance and Lifecycle | =7.0.2 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of RSA Identity Lifecycle and Governance is CVE-2018-1245.
The severity of CVE-2018-1245 is critical with a score of 8.8.
RSA Identity Lifecycle and Governance versions 7.0.1, 7.0.2, and 7.1.0 are affected by CVE-2018-1245.
The risk of CVE-2018-1245 is an authorization bypass vulnerability that allows a remote authenticated malicious user to bypass Java Security Policies.
Yes, you can find references for CVE-2018-1245 at these links: [http://seclists.org/fulldisclosure/2018/Jul/46](http://seclists.org/fulldisclosure/2018/Jul/46) and [http://www.securitytracker.com/id/1041287](http://www.securitytracker.com/id/1041287).