First published: Tue Oct 20 2020(Updated: )
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Focused Run | =9.7 | |
SAP Focused Run | =10.1 | |
SAP Focused Run | =10.5 | |
SAP Focused Run | =10.7 | |
SAP NetWeaver Solution Manager | =9.7 | |
SAP NetWeaver Solution Manager | =10.1 | |
SAP NetWeaver Solution Manager | =10.5 | |
SAP NetWeaver Solution Manager | =10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6369 is considered a high severity vulnerability due to the risk of unauthenticated access if default passwords are not changed.
To fix CVE-2020-6369, change the default passwords for the Admin and Guest accounts immediately.
CVE-2020-6369 affects SAP Solution Manager and SAP Focused Run versions 9.7, 10.1, 10.5, and 10.7.
If exploited, CVE-2020-6369 could lead to unauthorized access, compromising the confidentiality of sensitive information.
Yes, you should update to the versions provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, and 10.7 to mitigate CVE-2020-6369.