Vulnerability Details : CVE-2014-5173
SAP HANA Extend Application Services (XS) allows remote attackers to bypass access restrictions via a request to a private IU5 SDK application that was once public.
Products affected by CVE-2014-5173
- cpe:2.3:a:sap:hana_extended_application_services:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5173
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5173
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-5173
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5173
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/94931
SAP HANA Extended Application Services security bypass CVE-2014-5173 Vulnerability Report
-
http://seclists.org/fulldisclosure/2014/Jul/150
Full Disclosure: [Onapsis Security Advisory 2014-022] SAP HANA IU5 SDK Authentication Bypass
-
http://www.securityfocus.com/bid/68950
SAP HANA Extended Application Services Information Disclosure Vulnerability
-
http://scn.sap.com/docs/DOC-8218
Acknowledgments to Security Researchers - Security and Identity Management - SCN Wiki
-
http://www.securityfocus.com/archive/1/532944/100/0/threaded
SecurityFocus
-
https://service.sap.com/sap/support/notes/1964428
-
http://packetstormsecurity.com/files/127667/SAP-HANA-IU5-SDK-Authentication-Bypass.html
SAP HANA IU5 SDK Authentication Bypass ≈ Packet Storm
Jump to