First published: Mon Jun 21 2010(Updated: )
The Telnet interface in the SAP J2EE Engine Core (SAP-JEECOR) 6.40 through 7.02, and Server Core (SERVERCORE) 7.10 through 7.30 allows remote authenticated users to bypass a security check and conduct SMB relay attacks via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP J2EE Engine | =7.02 | |
SAP J2EE Engine | =6.40 | |
SAP J2EE Engine | =7.00 | |
SAP J2EE Engine | =7.01 | |
SAP Server Core | =7.30 | |
SAP Server Core | =7.20 | |
SAP Server Core | =7.10 | |
SAP Server Core | =7.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2347 is considered a medium severity vulnerability due to its ability to allow remote authenticated users to perform SMB relay attacks.
To fix CVE-2010-2347, it is recommended to upgrade to a patched version of the SAP J2EE Engine Core or Server Core that addresses this vulnerability.
CVE-2010-2347 affects SAP J2EE Engine Core versions 6.40 to 7.02 and Server Core versions 7.10 to 7.30.
Yes, CVE-2010-2347 can be exploited remotely by authenticated users to conduct SMB relay attacks.
The implications of CVE-2010-2347 include potential unauthorized access and data interception due to the bypass of security checks.