First published: Fri Feb 28 2020(Updated: )
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer | <6.7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-5331 is high with a CVSS score of 5.5.
CVE-2020-5331 is an information exposure vulnerability in RSA Archer versions prior to 6.7 P3 (6.7.0.3).
An authenticated malicious local user with access to the log files can exploit CVE-2020-5331 to obtain exposed session information.
RSA Archer versions prior to 6.7 P3 (6.7.0.3) are affected by CVE-2020-5331.
Yes, a security update is available for CVE-2020-5331. Please refer to the reference link for more information.