Description
The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack.
Published: 2014-04-17
Score: 4.3 Medium
EPSS: 9.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T09:34:40.409Z

Reserved: 2014-01-07T00:00:00.000Z

Link: CVE-2014-0984

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2014-04-17T14:55:08.857

Modified: 2026-05-06T22:30:45.220

Link: CVE-2014-0984

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses