First published: Thu Apr 17 2014(Updated: )
The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Router | =710-029 | |
SAP Router | =720-411 | |
SAP Router | =721-117 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0984 is considered a high severity vulnerability due to the ease with which attackers can exploit it using brute-force techniques.
To fix CVE-2014-0984, it is recommended to upgrade to the latest patched version of SAP Router that addresses this vulnerability.
CVE-2014-0984 affects SAP Router versions 710-029, 720-411, and 721-117 and earlier.
CVE-2014-0984 enables remote attackers to conduct brute-force attacks on the password validation of route permissions.
Yes, CVE-2014-0984 remains a concern for environments using affected versions of SAP Router that have not been updated.