Description
The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T09:34:40.409Z
Reserved: 2014-01-07T00:00:00.000Z
Link: CVE-2014-0984
No data.
Status : Modified
Published: 2014-04-17T14:55:08.857
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-0984
No data.
OpenCVE Enrichment
No data.
Weaknesses