Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

RSUSR003 Standard passwords for hash code versions H and I, SAP security note 1315883

Description

You use the report RSUSR003 to obtain cross-client statements about the password status for the standard users SAP*, DDIC, SAPCPIC, and EARLYWATCH.
However, the report does not support the new hash code versions H and I.

Available fix and Supported packages

  • SAP_BASIS | 710 | 711
  • SAP_BASIS 710 | SAPKB71008 |
  • SAP_BASIS 711 | SAPKB71103 |
  • SAP KERNEL 7.10 32-BIT | SP145 | 000145
  • SAP KERNEL 7.10 32-BIT UNICODE | SP145 | 000145
  • SAP KERNEL 7.10 64-BIT | SP145 | 000145
  • SAP KERNEL 7.10 64-BIT UNICODE | SP145 | 000145
  • SAP KERNEL 7.11 32-BIT | SP032 | 000032
  • SAP KERNEL 7.11 32-BIT UNICODE | SP032 | 000032
  • SAP KERNEL 7.11 64-BIT | SP032 | 000032
  • SAP KERNEL 7.11 64-BIT UNICODE | SP032 | 000032

Affected component

    BC-SEC-USR-IS
    User Information System

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1315883

TAGS

#Salted-hash
#login/password_downwards_compatibility
#CODVN

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below