First published: Tue Feb 13 2024(Updated: )
Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensitive information. There is no impact on the availability of the system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25642 has a high severity due to the potential for an attacker to impersonate servers and intercept sensitive information.
To fix CVE-2024-25642, ensure that your SAP Cloud Connector version is updated to the latest secure version that addresses the certificate validation issue.
CVE-2024-25642 specifically affects SAP Cloud Connector version 2.0.
An attacker can perform a man-in-the-middle attack by impersonating genuine servers due to improper certificate validation.
The risks associated with CVE-2024-25642 include unauthorized access to sensitive data and the ability to modify requests sent to the SAP Cloud Connector.