First published: Mon May 06 2024(Updated: )
An issue was discovered in Archer Platform 6 before 2024.04. Authentication was mishandled because lock did not terminate an existing session. 6.14 P3 (6.14.0.3) is also a fixed release.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer GRC Platform | <2024.04 | |
RSA Archer GRC Platform | ||
<6.14.0.3 | ||
=2024.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34092 is classified as a critical vulnerability due to improper session handling which can lead to unauthorized access.
To fix CVE-2024-34092, update to Archer Platform version 6.14.0.3 or later.
The risks associated with CVE-2024-34092 include potential unauthorized access to sensitive information due to improper session management.
Archer Platform versions prior to 2024.04 and 6.14 P3 (6.14.0.3) are affected by CVE-2024-34092.
CVE-2024-34092 involves mishandling of authentication due to failure to terminate an existing user session.