First published: Thu Apr 17 2014(Updated: )
The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Router | =710-029 | |
SAP Router | =720-411 | |
SAP Router | =721-117 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.