Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-41417 | The RFC enabled function module allows a low privileged user to perform denial of service on any user and also change or delete favourite nodes. By sending a crafted packet in the function module targeting specific parameters, the specific targeted user will no longer have access to any functionality of SAP GUI. There is low impact on integrity and availability of the application. |
Tue, 10 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Sep 2024 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The RFC enabled function module allows a low privileged user to perform denial of service on any user and also change or delete favourite nodes. By sending a crafted packet in the function module targeting specific parameters, the specific targeted user will no longer have access to any functionality of SAP GUI. There is low impact on integrity and availability of the application. | |
| Title | Multiple vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-09-10T13:41:26.018Z
Reserved: 2024-08-26T10:39:20.933Z
Link: CVE-2024-45285
Updated: 2024-09-10T13:41:19.932Z
Status : Deferred
Published: 2024-09-10T05:15:12.590
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-45285
No data.
OpenCVE Enrichment
No data.
EUVD