First published: Tue Sep 10 2024(Updated: )
SAP NetWeaver AS for Java allows an authorized attacker to obtain sensitive information. The attacker could obtain the username and password when creating an RFC destination. After successful exploitation, an attacker can read the sensitive information but cannot modify or delete the data.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server Java |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45283 is classified as a medium severity vulnerability as it allows unauthorized access to sensitive information.
To mitigate CVE-2024-45283, update to the latest version of SAP NetWeaver AS for Java as recommended by SAP's security advisory.
CVE-2024-45283 can lead to the compromise of usernames and passwords when creating an RFC destination.
The vulnerability affects users of SAP NetWeaver AS for Java, particularly those with improper configurations.
No, CVE-2024-45283 requires an attacker to have authorized access to exploit the vulnerability.