First published: Tue Nov 04 2014(Updated: )
SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP CommonCryptoLib | <=8.4.29 | |
SAP SAPCRYPTOLIB | <=5.555.37 | |
SAP Sapseculib | ||
SAP HANA Database | ||
SAP NetWeaver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8587 is considered a high severity vulnerability due to its potential for remote exploitation and impact on digital signature integrity.
To fix CVE-2014-8587, update SAPCRYPTOLIB, SAPSECULIB, and CommonCryptoLib to versions 5.555.38 or 8.4.30 or later.
CVE-2014-8587 allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures, compromising the authenticity of signed data.
CVE-2014-8587 affects SAP NetWeaver AS for ABAP, SAP HANA, SAPCRYPTOLIB versions lower than 5.555.38, SAPSECULIB, and CommonCryptoLib versions lower than 8.4.30.
While there have been no confirmed reports of active exploitation for CVE-2014-8587, the nature of the vulnerability warrants immediate remediation.