Unisphere for VMAX: Reset of U4V Lockbox with updatessv fails with “ERROR – AMSCallbackBase:Missing required -cstdir argument”

Article Number: 503014 Article Version: 4 Article Type: Break Fix



Unisphere for VMAX

Unisphere for VMAX on Windows platform SMAS service starts and then stops again.

In the smas.log:

ERROR [em.bp.SECURITY] (ServerService Thread Pool — 80) CSTService.init:Failed to initialize: com.emc.csp.error.IOException: The Lockbox stable value threshold was not met because the system fingerprint has changed. To reset the system fingerprint, open the Lockbox using the passphrase. : File : C:PROGRA~1EMCSMASjbossstandalonedatacst/csp.clb

The required action to reset the U4V lockbox with command service.bat updatessv <U4VLockboxPassword> fails with:

c:Program FilesEMCSMASjbossbin>service.bat updatessv <password>



Running command [“Update CST SSVs”]

The system cannot find the file specified.

CLASSPATH = “C:PROGRA~1EMCSMASjboss ……….”

log4j:WARN No appenders could be found for logger (org.hibernate.cfg.annotations

.Version).

log4j:WARN Please initialize the log4j system properly.

ERROR – AMSCallbackBase:Missing required -cstdir argument

INFO – AMSCallbackBase:Usage: com.emc.em.common.security.cst.AMSCallbackMain {-c

stdir=<cstdirpath> -passphrase=<passphrase> -hostname=<name> {-inituser | -addho

st=<name> -removehost=<name> | -dbdump | -validate | -resign | -listhosts | -new

passphrase=<passphrase> | -updatessv} | -usage | -cstdir=<cstdirpath> -hostname=

<name> {-pam | -ldapdebuglevel={0,1,2,3} | -adduser=<username> -userpassword=<pa

ssword>}

This failure to reset Unisphere for VMAX lockbox with the errors above can be caused by a corrupted service.bat file.

Please contact DellEMC support and provide:

1. emcreports collection from the Unisphere for VMAX node

2. full output from service.bat updatessv command

and quote this Knowledgebase article.

Related:

  • No Related Posts

Cisco Identity Services Engine Password Recovery Vulnerability

A vulnerability in the Admin Portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to view saved passwords in plain text.

The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin Portal. An attacker with read or write access to the Admin Portal could exploit this vulnerability by browsing to a page that contains sensitive data. An exploit could allow the attacker to recover passwords for unauthorized use and expose those accounts to further attack.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-passwd

Security Impact Rating: Medium

CVE: CVE-2018-15456

Related:

  • No Related Posts

Cisco Unified Communications Manager Digest Credentials Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view digest credentials in clear text.

The vulnerability is due to the incorrect inclusion of saved passwords in configuration pages. An attacker could exploit this vulnerability by logging in to the Cisco Unified Communications Manager web-based management interface and viewing the source code for the configuration page. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cucm-creds-disclosr

Security Impact Rating: Medium

CVE: CVE-2018-0474

Related:

  • No Related Posts

Uninstall Symantec without password

I need a solution

I applied Policy to prevent any user from unistalling the SEP without password, but user still can unistall the SEP without asking for password,

i am sure there is no problem in applying the policy, i applied as follow > 

  1. Click Clients
  2. Select Policies tab.
  3. Click on General Settings.
  4. Select Security Settings tab.
  5. Select Require a password to uninstall the client
  6. Type the <password> in the box.
  7. Click OK.

Note: user when try to stop SEP service “SMC-Stop” , he can’t because it’s asking for a password, i don’t know why it’s not working with unistall the application.

windows version 10 “1709 & 1803”

0

Related:

  • No Related Posts

How to Reset ShareFile Password

Article topics:

Reset Forgot Password

If you have forgotten your ShareFile account password, you can reset it from your ShareFile account login screen.

Important: ShareFile password reset uses the reCAPTCHA tool for verification. reCAPTCHA is not supported by Microsoft Edge. See ShareFile No Password Reset in Microsoft Edge for more information.

  1. Navigate to your login screen and click the Forgot password? link below the login button.
  2. Verify your identity.
  3. Complete the reCAPTCHA tool.

    User-added image

  4. Click send.
  5. The ShareFile system will send you an email that contains a link to reset your password. This link will expire after 15 minutes. Each time you send a password reset, the previous reset link will expire.
  6. Enter a new password.

Note:

If you come across error “You Do Not Have Permission to Change Password for the Below Account(s)”, refer article CTX239979 –ShareFile Error: “You Do Not Have Permission to Change Password for the Below Account(s)”

Change Your Password

  1. Log in to your ShareFile account and click Settings > Personal Settings > Edit Profile
  2. Under Change Password, enter your old password prior to creating a new one.
  3. Click Save.

Can’t Change Password

You may only modify your password if you have been granted access to do so. If you cannot change your password, please contact the administrator on your account.

ShareFile Password Requirements

By default, a ShareFile password must contain:

  • A minimum of 8 characters
  • 1 upper case letter
  • 1 lower case letter
  • 1 number
  • No more than 50 characters

These requirements cannot be modified.

Additional Password Requirements

The Administrator user of your ShareFile account may change the password requirements for the ShareFile account at their own discretion. To do so, navigate to the Admin section of your ShareFile account and click Password Policy in the sidebar. Any changes made will go into effect the next time a user changes his or her password. When a password’s expiration time is met, users will be prompted to change their password the next time they log in to ShareFile.

Related:

  • No Related Posts

How to decrypt with Recovery Certificate with SEE Client

I need a solution

Hi, guys.

I would like to know if there is a way to decrypt encrypted file that were encrypted by SEE RME using the SEE Client instead of the Removable Media Access Utility?

The main reason I want to know this is that Removable Media Access Utility can only be run from a removable storage and on a machine without SEE client.

Here’s a scenario for easy understading:

User A forgets his password which was used to encrypted the new files on his USB drive and he lives half the globe away from the administrator designated for recovery. Therefore he is unable to provide the administrator with the USB drive but he can send the encrypted file to the administrator to recover via recovery certificate. 

Is there a way to decrypt the file with recovery certificate using the SEE Client instead of the Access Utility?

0

Related:

  • No Related Posts

Symantec Encryption Management Server new user

I need a solution

So I’m new to this company and they are running Symantec Encryption Management Server.  Just using the File Encryption piece with a hand full of users.

Recently we need to add a new user.

I installed Symantec PGP Desktop (same version as the rest of the users).  

Imported the domain key.  Generated an individual key for the new user and exported it with a password.  All keys at this point in the desktop app show Green and synchronize successfully.

Then I imported it onto the Symantec EMS successfully.

The new user shows up, but not able to open any files.

I did notice that all the other users’ keys are listed as GKM and this user is listed as CKM.  

I’m obviously doing something wrong, but not sure what.

0

Related:

  • No Related Posts