First published: Tue Jul 09 2024(Updated: )
Due to a Protection Mechanism Failure in SAP NetWeaver Application Server for ABAP and ABAP Platform, a developer can bypass the configured malware scanner API because of a programming error. This leads to a low impact on the application's confidentiality, integrity, and availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS ABAP Kernel | ||
SAP ABAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39599 is categorized as a low severity vulnerability.
To mitigate CVE-2024-39599, ensure you apply the latest patches available from SAP for your NetWeaver Application Server for ABAP and ABAP Platform.
CVE-2024-39599 has a low impact on the application's confidentiality, integrity, and availability.
CVE-2024-39599 affects SAP NetWeaver Application Server for ABAP and SAP ABAP Platform.
Currently, there is no official workaround specified for CVE-2024-39599 aside from applying the necessary updates.