This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Platform Product Advisories
Read and subscribe to the latest announcements and advisories relating to the NetWitness Platform.
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • NetWitness Community
  • Products
  • NetWitness Platform
  • Advisories
  • Product Advisories
  • Microprocessor Side-Channel Vulnerabilities (CVE-2018-3639 and CVE-2018-3640): Impact on RSA product...
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Printer Friendly Page
    • Report Inappropriate Content
Microprocessor Side-Channel Vulnerabilities (CVE-2018-3639 and CVE-2018-3640): Impact on RSA products

Microprocessor Side-Channel Vulnerabilities (CVE-2018-3639 and CVE-2018-3640): Impact on RSA products

Article Number

000036372

CVE ID

000036372

Article Summary

RSA is aware of the side-channel vulnerabilities known as Speculative Store Bypass (CVE-2018-3639) and Rogue System Register Read (CVE-2018-3640) affecting many modern microprocessors that were published by researchers from Microsoft Security Response Center (MSRC) and Google Project Zero on 21 May 2018. An unprivileged attacker with local user access to the system could potentially exploit these vulnerabilities to read privileged memory data. For more information, please review security updates posted by Intel.
 
RSA is investigating the impact of these issues on our products. We will update this article regularly with impact details and mitigation steps as they become available. Mitigation steps may vary by product and may require updates to processor microcode (BIOS), Operating System (OS), Virtual Machine Manager (VMM), and other software components.
 
RSA recommends customers follow security best practices for malware protection to help prevent possible exploitation of these vulnerabilities until any future updates can be applied. These practices include, but are not limited to, promptly deploying software updates, avoiding unknown hyperlinks and websites, never downloading files or applications from unknown sources, and employing up-to-date anti-virus and advanced threat protection solutions.
 
For information on other Dell products, please see http://dell.com/support/speculative-store-bypass.

Link to Advisories

  • Intel Security Advisory INTEL-SA-00115: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
  • Intel Security Microsite: https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html
  • ADV180012 - Microsoft Guidance for Speculative Store Bypass for CVE-2018-3639: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
  • ADV180013 - Microsoft Guidance for Rogue System Register Read for CVE-2018-3640: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013
  • Microsoft Security Research and Defense blog: https://aka.ms/sescsrdssb
  • Google Project Zero Blog: https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

Resolution

 
RSA Product NameVersionsImpact StatusDetailsLast Updated
3D Secure / Adaptive Authentication eCommerceCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Access Manager6.2No direct impactSee Note 1.2018-05-21
Adaptive Authentication CloudCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Adaptive Authentication HostedCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Adaptive Authentication On-PremAll SupportedNo direct impactSee Note 1.2018-05-21
Archer Hosted (US)Current Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Archer Hosted (EMEA)Current Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Archer PlatformAll SupportedNo direct impactSee Note 1.2018-05-21
Archer Security Operations Management (SecOps)All SupportedNo direct impactSee Note 1.2018-05-21
Archer Vulnerability & Risk Manager (VRM) - Hardware ApplianceAll SupportedNo additional security riskSee Note 3.2018-05-21
Archer Vulnerability & Risk Manager (VRM) - Virtual ApplianceAll SupportedNo additional security riskSee Note 3.
Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.
2018-05-21
Authentication Manager (Hardware Appliance - Dell PowerEdge & Intel platforms)All SupportedNo additional security riskSee Note 3.2018-05-21
Authentication Manager (Virtual Appliance)All SupportedNo additional security riskSee Note 3.
Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.
2018-05-21
Authentication Manager Web TierAll SupportedNo direct impactSee Note 1.2018-05-21
BSAFE C Products: MES, Crypto-C ME, SSL-CAll SupportedNo direct impactSee Note 1.2018-05-21
BSAFE Java Products: Cert-J, Crypto-J, SSL-JAll SupportedNo direct impactSee Note 1.2018-05-21
Data Loss Prevention (Hardware Appliance)All SupportedImpactedRemediation plan in progress.2018-05-21
Data Loss Prevention (Virtual Appliance)All SupportedImpactedRemediation plan in progress. Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.2018-05-21
Data Protection Manager (Software)All SupportedNo direct impactSee Note 1.2018-05-21
Data Protection Manager (Hardware Appliance)All SupportedImpacted - RemediatedRSA Data Protection Manager 3.5.2.7 contains resolution for this issue. For more details, refer to the security advisory DSA-2018-189.2018-10-02
Data Protection Manager (Virtual Appliance)All SupportedImpacted - RemediatedRSA Data Protection Manager 3.5.2.7 contains resolution for this issue. For more details, refer to the security advisory DSA-2018-189.
Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.
2018-10-02
DCS: Certificate Manager6.9No direct impactSee Note 1.2018-05-21
DCS: Validation Manager3.2No direct impactSee Note 1.2018-05-21
eFraudNetwork (eFN)Current Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
enVisionEOL The product has reached End of Life. Please refer to the Product Version Life Cycle for RSA enVision page on RSA Link.2018-05-21
Federated Identity Manager4.2No direct impactSee Note 1.2018-05-21
FraudAction (OTMS)Current Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Identity Governance & Lifecycle (Software),
Via Lifecycle & Governance (Software),
Identity Management & Governance (Software)
7.1, 7.0.2, 7.0.1, 7.0, 6.9.1, 6.9.0No direct impactSee Note 1.2018-05-21
Identity Governance & Lifecycle (Hardware Appliance),
Via Lifecycle & Governance (Hardware Appliance),
Identity Management & Governance (Hardware Appliance)
7.1, 7.0.2, 7.0.1, 7.0, 6.9.1, 6.9.0Impacted - RemediatedRefer to the security advisory DSA-2018-179 for OS and BIOS updates.

Any Remote Agents or Remote AFX deployed in customer environment are a software product only and have no direct impact. See Note 1.
2018-09-25
Identity Governance & Lifecycle (Virtual Application)7.1Impacted - RemediatedRefer to the security advisory DSA-2018-179 for OS updates. Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.

Any Remote Agents or Remote AFX deployed in customer environment are a software product only and have no direct impact. See Note 1.
2018-09-25
Identity Governance & Lifecycle SaaS / MyAccessLive Under investigationAny Remote Agents or Remote AFX deployed in customer environment are a software product only and have no direct impact. See Note 1.2018-05-21
NetWitness Endpoint (ECAT)All SupportedNo direct impactSee Note 1.2018-05-21
NetWitness Logs & Packets / Security Analytics
(Hardware Appliance)
All SupportedNo additional security riskSee Note 3.2018-05-21
NetWitness Logs & Packets / Security Analytics
(Virtual Appliance)
All SupportedNo additional security riskSee Note 3.
Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.
2018-05-21
NetWitness Logs & Packets / Security Analytics - Legacy Windows CollectorAll SupportedNo direct impactSee Note 1.2018-05-21
NetWitness Live InfrastructureCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
RSA Authentication Client (RAC)All SupportedNo direct impactSee Note 1.2018-05-21
RSA CentralCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
SecurID Access Cloud ServiceCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
SecurID Access IDR VMAll SupportedNo additional security riskSee Note 2.
Customers are strongly advised to patch the virtual host environment where the product is deployed for full protection.
2018-05-21
SecurID Agent for PAMAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Agent for WebAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Agent for WindowsAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Authenticate App for AndroidAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Authenticate App for iOSAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Authenticate App for Windows 10All SupportedNo direct impactSee Note 1.2018-05-21
SecurID Authentication EngineAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Authentication SDKAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token ConverterAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token for AndroidAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token for BlackberryAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token for DesktopAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token for iPhoneAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token for Windows MobileAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token ToolbarAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Software Token Web SDKAll SupportedNo direct impactSee Note 1.2018-05-21
SecurID Transaction Signing SDKAll SupportedNo direct impactSee Note 1.2018-05-21
SYNCurrent Hosted EnvironmentNo additional security riskSee Note 2.2018-05-30
Web Threat DetectionAll SupportedNo direct impactSee Note 1.2018-05-21

Note 1: It is a software product only. Reported vulnerabilities are best mitigated via firmware and operating system updates. Customers are strongly advised to patch their host systems where the product is installed.

Note 2: To take advantage of these vulnerabilities, an attacker first must be able to run malicious code on the targeted system. The product is designed to prevent users from loading and executing any external and/or untrusted code on the system. The reported issues do not introduce any additional security risk to the product.

Note 3: ​To take advantage of these vulnerabilities, an attacker first must be able to run malicious code on the targeted system. Access to the product to load external and/or potentially untrusted code is restricted to users with root or root-equivalent privileges only. The reported issues do not introduce any additional security risk to the product, provided the recommended best practices to protect the access of highly privileged account are followed.

Notes

For information on other Dell products, please see http://dell.com/support/speculative-store-bypass.
Tags (17)
  • Advisory
  • All Products
  • All RSA Products
  • All Versions
  • Any Version
  • Customer Support
  • Customer Support Article
  • Every Version
  • High Profile
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • RSA Security Advisory
  • RSA Security Alert
  • Security Advisory
  • Security Advisory Article
  • Version Agnostic
0 Likes
Was this article helpful? Yes No
No ratings

In this article

Version history
Last update:
‎2020-12-12 07:42 PM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.