IBM Tivoli Federated Identity Manager XML Signature Validation Bypass

Medium Nessus Plugin ID 70126


The remote host has an application installed that is affected by a signature validation bypass vulnerability.


The version of IBM Tivoli Federated Identity Manager installed on the remote Windows host is affected by a signature validation bypass vulnerability due to improper validation of XML signatures related to certain single sign-on protocols and token modules. A remote, unauthenticated attacker can exploit this, via a specially crafted message, to perform actions as another user.


Upgrade to Tivoli Federated Identity Manager / / / or later.

See Also

Plugin Details

Severity: Medium

ID: 70126

File Name: tivoli_federated_identity_manager_swg21612612.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Family: Windows

Published: 2013/09/25

Modified: 2015/10/08

Dependencies: 86318

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_federated_identity_manager

Required KB Items: installed_sw/IBM Tivoli Federated Identity Manager

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/09/28

Vulnerability Publication Date: 2012/09/28

Reference Information

CVE: CVE-2012-3314

BID: 55732

OSVDB: 85866