First published: Tue Sep 10 2024(Updated: )
Due to missing authorization check, SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker logged in as a developer to read objects contained in a package. This causes an impact on confidentiality, as this attacker would otherwise not have access to view these objects.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS ABAP | =700 | |
SAP NetWeaver AS ABAP | =701 | |
SAP NetWeaver AS ABAP | =702 | |
SAP NetWeaver AS ABAP | =731 | |
SAP NetWeaver AS ABAP | =740 | |
SAP NetWeaver AS ABAP | =750 | |
SAP NetWeaver AS ABAP | =751 | |
SAP NetWeaver AS ABAP | =752 | |
SAP NetWeaver AS ABAP | =753 | |
SAP NetWeaver AS ABAP | =754 | |
SAP NetWeaver AS ABAP | =755 | |
SAP NetWeaver AS ABAP | =756 | |
SAP NetWeaver AS ABAP | =757 | |
SAP NetWeaver AS ABAP | =758 | |
SAP NetWeaver AS ABAP | =912 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41728 has been assessed as having a high severity due to its impact on confidentiality.
To mitigate CVE-2024-41728, it is recommended to apply the latest patches provided by SAP for affected versions of NetWeaver Application Server for ABAP.
CVE-2024-41728 affects multiple versions of SAP NetWeaver Application Server for ABAP, specifically versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, and 912.
CVE-2024-41728 enables an attacker logged in as a developer to read unauthorized objects contained within a package.
Currently, no official workaround is provided for CVE-2024-41728, so applying security patches is the recommended course of action.