First published: Wed Apr 30 2014(Updated: )
SAP Netweaver Java Application Server does not properly restrict access, which allows remote attackers to obtain the list of SAP systems registered on an SLD via an unspecified webdynpro, related to SystemSelection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Java Application Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3133 is classified as medium, indicating a potential for unauthorized access to sensitive information.
To fix CVE-2014-3133, ensure your SAP Netweaver Java Application Server is updated to the latest version that addresses the access restriction issue.
CVE-2014-3133 allows remote attackers to obtain a list of SAP systems registered on the Software Life Cycle Management, potentially exposing sensitive infrastructure information.
CVE-2014-3133 affects users and administrators of the SAP Netweaver Java Application Server who have not implemented the necessary security controls.
Yes, CVE-2014-3133 is exploitable remotely, allowing attackers to access sensitive system information without requiring local network access.