Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential bypass of unified connectivity runtime checks possible in BC-MID-RFC, SAP security note 2245130

Description

A bypass of the Unified Connectivity runtime check is possible in case the first user logon failed.

Available fix and Supported packages

  • KRNL64NUC | 7.42 | 7.42
  • KRNL64UC | 7.42 | 7.42
  • SAP_BASIS | 740 | 740
  • SAP_BASIS | 750 | 750
  • KERNEL | 7.42 | 7.42
  • KERNEL | 7.45 | 7.45
  • SAP_BASIS 740 | SAPKB74015 |
  • SAP_BASIS 750 | SAPK-75003INSAPBASIS |
  • SAP KERNEL 7.42 64-BIT | | 000315
  • SAP KERNEL 7.42 64-BIT UNICODE | | 000315
  • SAP KERNEL 7.45 64-BIT | | 000031
  • SAP KERNEL 7.45 64-BIT UNICODE | | 000031

Affected component

    BC-MID-RFC
    RFC

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2245130

TAGS

#UCON
#Unified-Connectivity
#RFC

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,