RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13351 | RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-16T22:39:54.202Z
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3716
No data.
Status : Modified
Published: 2019-03-13T21:29:00.447
Modified: 2024-11-21T04:42:23.313
Link: CVE-2019-3716
No data.
OpenCVE Enrichment
No data.
EUVD