First published: Wed Oct 05 2016(Updated: )
The (1) SCTC_REFRESH_EXPORT_TAB_COMP, (2) SCTC_REFRESH_CHECK_ENV, and (3) SCTC_TMS_MAINTAIN_ALOG functions in the SCTC subpackage in SAP Netweaver 7.40 SP 12 allow remote authenticated users with certain permissions to execute arbitrary commands via vectors involving a CALL 'SYSTEM' statement, aka SAP Security Note 2260344.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | =7.40-sp12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7435 has been categorized as a high severity vulnerability due to the potential for remote command execution.
To fix CVE-2016-7435, ensure that you update to the latest patch release of SAP NetWeaver that addresses this vulnerability.
CVE-2016-7435 affects remote authenticated users with certain permissions in SAP NetWeaver 7.40 SP 12.
An attacker exploiting CVE-2016-7435 can execute arbitrary commands on the affected system.
The functions SCTC_REFRESH_EXPORT_TAB_COMP, SCTC_REFRESH_CHECK_ENV, and SCTC_TMS_MAINTAIN_ALOG in the SCTC subpackage are vulnerable in CVE-2016-7435.