Artiva Agency Single Sign-On (SSO) feature checks only the local Windows login name which could allow an attacker to impersonate another Artiva Agency user.
Artiva Agency Single Sign-On (SSO) feature when configured with the domain name option allows the currently logged on Windows user to automatically be logged into the Artiva Agency application using the same username without any additional authentication. Artiva Agency Single Sign-On (SSO) checks only the local Window login name and as a result does not take into consideration the associated user's domain name. By creating a local Windows user account with the same username as a Windows domain account, Artiva Agency will allow the attacker to login as the domain account to the Artiva Agency application.
An unauthenticated Artiva Agency user can create a local Windows user account with the same username as a Windows domain account and Artiva Agency will allow the attacker to login as the domain account to the Artiva Agency application.
The vendor has released an update to address this vulnerability. Affected users are advised to update to Artiva Workstation 1.3.9 or later. The vendor has stated that additional setup work in the Artiva application is required.
It has been reported to us that this vulnerability affects the following Artiva line products and versions:
Artiva Healthcare 5.2 MR5 or newer
Artiva Architect 3.2 MR5 or newer
Workstation 1.3.0 or newer
Thanks to the reporter that wishes to remain anonymous.
|Date First Published:||2014-04-14|
|Date Last Updated:||2014-04-14 14:17 UTC|