{"api_version":"1","generated_at":"2026-04-23T00:39:51+00:00","cve":"CVE-2019-3716","urls":{"html":"https://cve.report/CVE-2019-3716","api":"https://cve.report/api/cve/CVE-2019-3716.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-3716","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-3716"},"summary":{"title":"CVE-2019-3716","description":"RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.","state":"PUBLIC","assigner":"security_alert@emc.com","published_at":"2019-03-13 21:29:00","updated_at":"2020-08-24 17:37:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://seclists.org/fulldisclosure/2019/Mar/19","name":"20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/107406","name":"107406","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"RSA Archer GRC Platform CVE-2019-3716 Local Information Disclosure Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-3716","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3716","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"3716","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rsa","cpe5":"archer_grc_platform","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3716","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rsa","cpe5":"archer_grc_platform","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","DATE_PUBLIC":"2019-03-09T05:00:00.000Z","ID":"CVE-2019-3716","STATE":"PUBLIC","TITLE":"Information Exposure Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"RSA Archer","version":{"version_data":[{"affected":"<","version_value":"6.5 P2"}]}}]},"vendor_name":"Dell"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Information Exposure Vulnerability"}]}]},"references":{"reference_data":[{"name":"20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities","refsource":"FULLDISC","url":"https://seclists.org/fulldisclosure/2019/Mar/19"},{"name":"107406","refsource":"BID","url":"http://www.securityfocus.com/bid/107406"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2019-03-13 21:29:00","lastModifiedDate":"2020-08-24 17:37:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rsa:archer_grc_platform:*:*:*:*:*:*:*:*","versionEndExcluding":"6.5.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"3716","Ordinal":"141325","Title":"CVE-2019-3716","CVE":"CVE-2019-3716","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"3716","Ordinal":"1","NoteData":"RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"3716","Ordinal":"2","NoteData":"2019-03-13","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"3716","Ordinal":"3","NoteData":"2019-03-15","Type":"Other","Title":"Modified"}]}}}