First published: Tue Sep 10 2024(Updated: )
The RFC enabled function module allows a low privileged user to perform denial of service on any user and also change or delete favourite nodes. By sending a crafted packet in the function module targeting specific parameters, the specific targeted user will no longer have access to any functionality of SAP GUI. There is low impact on integrity and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS ABAP Kernel | ||
SAP ABAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45285 is considered a high severity vulnerability due to its potential to allow denial of service attacks.
To mitigate CVE-2024-45285, it is recommended to apply the latest security patches provided by SAP.
CVE-2024-45285 affects users of SAP NetWeaver Application Server for ABAP and SAP ABAP Platform.
CVE-2024-45285 enables a low privileged user to perform a denial of service attack and change or delete favorite nodes.
The impact of CVE-2024-45285 is that targeted users may lose access to their accounts and favorite nodes.