First published: Tue Feb 13 2024(Updated: )
SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS JAVA | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24743 has been categorized as a critical vulnerability due to the potential for unauthorized access to sensitive files.
To mitigate CVE-2024-24743, ensure that your SAP NetWeaver AS Java version is updated to the latest patch released by SAP.
CVE-2024-24743 affects users running SAP NetWeaver AS Java version 7.50.
CVE-2024-24743 allows unauthenticated attackers to access sensitive files through crafted XML requests.
Yes, CVE-2024-24743 can be exploited remotely over the network without authentication.