Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-45277 |
CWE-ID | CWE-1321 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
HANA Client Web applications / Other software |
Vendor | SAP |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU98138
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45277
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation when using the nestTables feature. A remote user can send specially crafted input to the application and perform prototype pollution attack, which can result in denial of service.
Install update from vendor's website.
Vulnerable software versionsHANA Client: 2.0
CPE2.3 External linkshttp://me.sap.com/notes/3520100
http://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.