First published: Fri Aug 05 2016(Updated: )
The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Database | <=1.00.73.00.389160 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6144 has a medium severity rating due to its potential for exploitation through brute force attacks.
To fix CVE-2016-6144, ensure that the password_lock_for_system_user setting is enabled to limit login attempts for the SYSTEM user.
CVE-2016-6144 affects all versions of SAP HANA prior to Revision 102 that do not have the password_lock_for_system_user configuration supported or set to true.
CVE-2016-6144 exposes systems to brute force attacks targeting the SYSTEM user login.
Failing to address CVE-2016-6144 can lead to unauthorized access and potential data breaches by allowing attackers to systematically guess user credentials.