Article Number
000038121
CVE ID
CVE-2019-11135
Article Summary
On November 12, 2019, Intel shared information about a new mechanism, similar to Microarchitectural Data Sampling (MDS) referred to as “TAA” (Transactional Synchronization Extensions (TSX) Asynchronous Abort). This mechanism affects CPUs that support TSX and the mitigations include additional means to clear buffers in software or disable TSX for those customers who do not use this functionality. RSA is working closely with Intel to release security updates to address this vulnerability and help customers ensure the security of the data and systems. RSA urges customers to review this article for impact on RSA products.
For information on other Dell products, refer to:
Link to Advisories
Resolution
RSA is assessing impact and this article will be updated with the remediation status for any RSA product that is impacted by these vulnerabilities.
RSA Product Name | Versions | Impacted? | Details | Last Updated |
---|
RSA Authentication Manager (Hardware Appliance) | All | Not Impacted | It is a single-user, root-user-only appliance. This issue does not introduce any additional security risk to a customer's environment, provided the recommended best practices to protect the access of highly privileged accounts are followed. | 2019-11-12 |
RSA Identity Governance & Lifecycle (Hardware Appliance) | 7.1.1, 7.1.0, 7.0.x | Impacted | Remediation pending availability of Dell PowerEdge BIOS updates. | 2019-11-12 |
RSA NetWitness Logs and Network (Hardware Appliance) | 11.x, 10.x | Impacted | Remediation pending availability of Dell PowerEdge BIOS updates. | 2019-11-12 |
Disclaimer
Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Software Technical Support at 1- 800 995 5095. RSA Security LLC and its affiliates, including without limitation, its ultimate parent company, Dell EMC, distributes RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall RSA, its affiliates or suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.