First published: Tue Mar 16 2004(Updated: )
SAP R/3 2.0B to 4.6D installs several clients with default users and passwords, which allows remote attackers to gain privileges via the (1) SAP*, (2) SAPCPIC, (3) DDIC, (4) EARLYWATCH, or (5) TMSADM accounts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Sap R 3 | =2.0b_to_4.6d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1577 is considered a high severity vulnerability due to the potential for unauthorized remote access to SAP systems.
To fix CVE-2002-1577, it is recommended to remove or change the default passwords for the affected SAP accounts.
CVE-2002-1577 affects SAP R/3 versions 2.0B to 4.6D.
CVE-2002-1577 allows exploitation of default user accounts such as SAP*, SAPCPIC, DDIC, EARLYWATCH, and TMSADM.
Yes, CVE-2002-1577 can lead to privilege escalation for attackers who gain access through the default accounts.