SAP NetWeaver AS Java Vulnerability Allows Unauthorized Access to Sensitive Data
CVE-2024-24743
8.6HIGH
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 13 February 2024
Summary
An XML parsing vulnerability exists in SAP NetWeaver AS Java (CAF - Guided Procedures) version 7.50. This vulnerability allows an unauthenticated attacker to send specially crafted XML requests over the network, enabling access to sensitive files and information stored within the system. Although the attacker cannot modify the accessed data, this situation raises concerns over data security and privacy. The system does implement expansion limits to ensure that the availability of the application is not compromised.
Affected Version(s)
SAP NetWeaver AS Java (Guided Procedures) 7.50
References
CVSS V3.1
Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved