8.1
CWE
284
Advisory Published
Updated

CVE-2016-6144

First published: Fri Aug 05 2016(Updated: )

The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
SAP HANA Database<=1.00.73.00.389160

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-6144?

    CVE-2016-6144 has a medium severity rating due to its potential for exploitation through brute force attacks.

  • How do I fix CVE-2016-6144?

    To fix CVE-2016-6144, ensure that the password_lock_for_system_user setting is enabled to limit login attempts for the SYSTEM user.

  • Who is affected by CVE-2016-6144?

    CVE-2016-6144 affects all versions of SAP HANA prior to Revision 102 that do not have the password_lock_for_system_user configuration supported or set to true.

  • What kind of attack does CVE-2016-6144 expose systems to?

    CVE-2016-6144 exposes systems to brute force attacks targeting the SYSTEM user login.

  • What are the implications of not addressing CVE-2016-6144?

    Failing to address CVE-2016-6144 can lead to unauthorized access and potential data breaches by allowing attackers to systematically guess user credentials.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203