First published: Wed Sep 15 2021(Updated: )
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Cloud Connector | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33695 has a medium severity level due to insufficient validation of the certificate during backend communication.
To fix CVE-2021-33695, ensure that proper certificate validation mechanisms are implemented in your SAP Cloud Connector configuration.
CVE-2021-33695 affects SAP Cloud Connector version 2.0.
Yes, CVE-2021-33695 can potentially allow unauthorized access if the certificate validation is not enforced.
Currently, the recommended course of action for CVE-2021-33695 is to apply the necessary updates that enforce proper certificate validation.