RSA RSAR Authentication Client Authenticator Issues

2010.10.09
Credit: Graham Steele
Risk: Low
Local: Yes
Remote: No
CWE: CWE-264


CVSS Base Score: 1.5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 2.7/10
Exploit range: Local
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ESA-2010-018: RSA Security Advisory: RSA, The Security Division of EMC, announces a fix for a potential security vulnerability in RSA® Authentication Client when storing secret key objects on an RSA SecurID® 800 Authenticator RSA Authentication Client 2.0.x, 3.0, and 3.5.x contain a potential vulnerability that could allow the unintended extraction, by a properly authenticated user, of secret (or symmetric) key objects stored on an RSA SecurID 800 Authenticator. This potential vulnerability is corrected in RSA Authentication Client 3.5.3. Description: CVE Identifier: CVE-2010-3321 RSA Authentication Client can be used to store secret key objects on an RSA SecurID 800 hybrid authenticator using the PKCS#11 API. According to PKCS#11 specifications, secret key objects tagged as SENSITIVE and NON-EXTRACTABLE cannot be exported from the device. This option safeguards against the possibility of a key being used in a manner for which it was not originally intended by the developer of the application (e.g., a user copying the key to another device). Affected versions of RSA Authentication Client ignore the SENSITIVE and NON-EXTRACTABLE tags for secret key objects and allow these objects to be extracted by a properly authenticated user. Affected Products: Any version of RSA Authentication Client used only with RSA SecurID 800 authenticators to store secret key objects tagged as SENSITIVE and NON-EXTRACTABLE. Platforms: Includes all OS versions of RSA Authentication Client Unaffected Products: The following RSA Authentication Client and RSA SecurID 800 use cases are NOT impacted by this vulnerability: * Use of the SecurID 800 authenticator as an RSA SecurID one-time passcode (OTP) generator * Secure storage of digital certificates or other asymmetric keys * Secure storage of secret key objects that are intended to be extractable (e.g., password storage) Recommendation: Customers using RSA Authentication Client and PKCS#11 to store SENSITIVE and NON-EXTRACTABLE secret key objects on RSA SecurID 800 authenticators should upgrade to RSA Authentication Client 3.5.3 as soon as possible. Customers using RSA Authentication Client and the RSA SecurID 800 authenticator for any other purposes are not impacted by this announcement and do not need to upgrade at this time. Common Vulnerability Scoring System (CVSS) Base Score: The Common Vulnerability Scoring System (CVSS) score for the item identified in this advisory is 1.5 (AV:L/AC:M/Au:S/C:P/I:N/A:N). For more information on CVSS scoring, please see the Knowledge Base Article, "Security Advisories Severity Rating" at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604 . Credits: RSA would like to thank Graham Steele, LSV, INRIA & CNRS & ENS-Cachan as well as Matteo Bortolozzo, Matteo Centenaro and Riccardo Focardi, Universita Ca'Foscari for reporting this issue. Obtaining Documentation: To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link. Obtaining More Information: For more information about RSA SecurID, visit the RSA web site at http://www.rsa.com/node.aspx?id=1156. Getting Support and Service: For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab. General Customer Support Information: http://www.rsa.com/node.aspx?id=1264 RSA SecurCare Online: https://knowledge.rsasecurity.com EOPS Policy: RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details. http://www.rsa.com/node.aspx?id=2575 SecurCare Online Security Advisories RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. About RSA SecurCare Notes & Security Advisories Subscription RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you'd like to stop receiving RSA SecurCare Notes & Security Advisories, or if you'd like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view5. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection. EMC Product Security Response Center Security_Alert (at) EMC (dot) com [email concealed] http://www.emc.com/contact-us/contact/product-security-response-center.h tm -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Cygwin) iEYEARECAAYFAkystKUACgkQtjd2rKp+ALxPJgCgiK1v3KqJNh/CMS0kiO4tzNCD PkcAn2TIALVSjUayDQRQNWebwETxlWWV =GQJ7 -----END PGP SIGNATURE-----

References:

http://www.securityfocus.com/bid/43795
http://www.securityfocus.com/archive/1/archive/1/514153/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top