Vulnerability Note VU#215284
Artiva Agency Single Sign-On (SSO) feature vulnerability
Original Release date: 14 Apr 2014 | Last revised: 14 Apr 2014
Artiva Agency Single Sign-On (SSO) feature checks only the local Windows login name which could allow an attacker to impersonate another Artiva Agency user.
Artiva Agency Single Sign-On (SSO) feature when configured with the domain name option allows the currently logged on Windows user to automatically be logged into the Artiva Agency application using the same username without any additional authentication. Artiva Agency Single Sign-On (SSO) checks only the local Window login name and as a result does not take into consideration the associated user’s domain name. By creating a local Windows user account with the same username as a Windows domain account, Artiva Agency will allow the attacker to login as the domain account to the Artiva Agency application.
An unauthenticated Artiva Agency user can create a local Windows user account with the same username as a Windows domain account and Artiva Agency will allow the attacker to login as the domain account to the Artiva Agency application.
The vendor has released an update to address this vulnerability. Affected users are advised to update to Artiva Workstation 1.3.9 or later. The vendor has stated that additional setup work in the Artiva application is required.
Vendor Information (Learn More)
It has been reported to us that this vulnerability affects the following Artiva line products and versions:
Artiva Rm 3.1 MR7 or newer
Artiva Healthcare 5.2 MR5 or newer
Artiva Architect 3.2 MR5 or newer
Workstation 1.3.0 or newer
VendorStatusDate NotifiedDate UpdatedOntario SystemsUnknown23 Jan 201423 Jan 2014If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
Thanks to the reporter that wishes to remain anonymous.
This document was written by Michael Orlando.
01 Apr 2014
Date First Published:
14 Apr 2014
Date Last Updated:
14 Apr 2014
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.