First published: Wed Dec 18 2019(Updated: )
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA Identity Governance and Lifecycle | =7.0 | |
EMC RSA Identity Governance and Lifecycle | =7.0.1 | |
EMC RSA Identity Governance and Lifecycle | =7.0.2 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p01 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p02 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p03 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p04 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p05 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p06 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p07 | |
EMC RSA Identity Governance and Lifecycle | =7.1.0-p08 | |
EMC RSA Identity Governance and Lifecycle | =7.1.1 | |
EMC RSA Identity Governance and Lifecycle | =7.1.1-p01 | |
EMC RSA Identity Governance and Lifecycle | =7.1.1-p02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18573 is classified as a high severity vulnerability due to the potential for session fixation attacks.
To mitigate CVE-2019-18573, upgrade to RSA Identity Governance and Lifecycle version 7.1.1 P03 or later.
CVE-2019-18573 affects RSA Identity Governance and Lifecycle versions 7.0 to 7.1.0 P02.
CVE-2019-18573 is a session fixation vulnerability that allows an authenticated local user to exploit session tokens.
While CVE-2019-18573 is primarily a local vulnerability, it can potentially be leveraged by remote attackers under certain conditions.