First published: Tue Dec 12 2023(Updated: )
SAP GUI for Windows and SAP GUI for Java allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to write data to a database table. By doing so the attacker could increase response times of the AS ABAP, leading to mild impact on availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server | =700 | |
SAP NetWeaver Application Server | =731 | |
SAP NetWeaver Application Server | =740 | |
SAP NetWeaver Application Server | =750 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49581 is considered a critical vulnerability due to its potential to allow unauthenticated access to sensitive information and database manipulation.
To mitigate CVE-2023-49581, update SAP NetWeaver Application Server for ABAP to the latest version or apply the specific patches provided by SAP.
CVE-2023-49581 affects SAP NetWeaver Application Server for ABAP versions 700, 731, 740, and 750.
An attacker exploiting CVE-2023-49581 can access restricted information and potentially write malicious data to database tables.
Yes, CVE-2023-49581 involves an unauthenticated attacker gaining access, which highlights the critical security implications of the vulnerability.