- Description
- The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sap:router:710:029:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4B4FF6BF-F2F0-4893-B5A1-2E55D56BA80D"
},
{
"criteria": "cpe:2.3:a:sap:router:720:411:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62B0C1B5-600E-4469-8837-F475E83F1F88"
},
{
"criteria": "cpe:2.3:a:sap:router:721:117:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DAA327C6-4FE3-4BE1-A0D4-1035201AC2FF"
}
],
"operator": "OR"
}
]
}
]