Remote Java JMX agent is configured without SSL client and password authentication in RSA Governance & Lifecycle
Article Number
Applies To
- RSA Governance & Lifecycle 8.0.0 P03 HF01 and later
Article Summary
A security vulnerability was identified in the AFX module related to the insecure configuration of the Java JMX agent. Specifically, the JMX agent was running without SSL and password authentication, potentially allowing unauthenticated remote access for monitoring or management, and posing a risk of remote code execution.
Link to Advisories
Alert Impact
Not Applicable
Alert Impact Explanation
In RSA Governance & Lifecycle 8.0.0 GA through 8.0.0 P03:
- The JMX and broker services within ActiveMQ were originally configured without secure authentication.
- In earlier implementation, the files jmx.access and jmx.password were used for JMX authentication, but these stored credentials in clear text, which posed a security risk.
In RSA Governance & Lifecycle 8.0.0 P03 HF01 and later:
As part of the resolution:
- ActiveMQ has been upgraded to version 5.16.x, eliminating the insecure configuration of both the broker and JMX services.
- SSL-based communication has been enabled for all JMX connections, replacing username/password-based authentication.
- The files jmx.access and jmx.password remain on the system for internal technical reasons, but:
- They are non-functional dummy files.
- The application does not use or rely on them in any way.
- Their presence does not pose a security risk.
Resolution
Any vulnerability scans that flag the presence of jmx.access or jmx.password in RSA Governance & Lifecycle 8.0.0 P03 HF01 or later, can be safely considered false positives. These files are inert and retained solely for compatibility purposes.
Disclaimer
Related Articles
Role membership rules configured in the RSA Identity Governance & Lifecycle's Role UI do not create rules when no checkbox… 48Number of Views Allow a large number of RADIUS clients to authenticate without adding an agent for each client in RSA Authentication Manag… 308Number of Views Generic REST Collector fails with 'com.aveksa.client.genericrest.GenericRestException: UNEVEN_JSON_PATH_CONFIGURATION' in … 271Number of Views "Invalid authentication handle" reported by the Cisco AnyConnect client when using RSA SecurID Access Cloud Authentication… 232Number of Views Configuring a restricted agent associated to a RADIUS client to control user access with RSA Authentication Manager 8.x. 87Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?