Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-42534 | In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability. |
Tue, 12 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability. | |
| Title | Information Disclosure vulnerability in SAP NetWeaver Java (Software Update Manager) | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-11-12T20:13:33.683Z
Reserved: 2024-09-27T20:05:59.021Z
Link: CVE-2024-47588
Updated: 2024-11-12T16:05:57.264Z
Status : Deferred
Published: 2024-11-12T01:15:04.700
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-47588
No data.
OpenCVE Enrichment
No data.
EUVD