First published: Tue Dec 10 2024(Updated: )
In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS ABAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54198 has been classified with a high severity due to its potential to expose sensitive credentials through crafted Remote Function Call (RFC) requests.
To fix CVE-2024-54198, it is recommended to apply the latest security patches provided by SAP for the NetWeaver Application Server ABAP.
CVE-2024-54198 affects users of the SAP NetWeaver Application Server ABAP, particularly those with configurations allowing unauthorized RFC requests.
An attacker exploiting CVE-2024-54198 could potentially access restricted service credentials, leading to further exploitation of remote services.
CVE-2024-54198 was disclosed in 2024, highlighting vulnerabilities in certain configurations of SAP NetWeaver Application Server ABAP.