Vulnerability Details : CVE-2014-5176
SAP FI Manager Self-Service has a hard-coded user name, which makes it easier for remote attackers to obtain access via unspecified vectors.
Products affected by CVE-2014-5176
- cpe:2.3:a:sap:fi_manager_self-service:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5176
0.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5176
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
References for CVE-2014-5176
-
http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-024
Page Not Found | Onapsis
-
https://service.sap.com/sap/support/notes/1929473
-
http://www.securityfocus.com/bid/68951
SAP FI Manager Self-Service Hardcoded Credentials Security Bypass Vulnerability
-
http://packetstormsecurity.com/files/127669/SAP-FI-Manager-Self-Service-Hardcoded-Username.html
SAP FI Manager Self-Service Hardcoded Username ≈ Packet Storm
-
http://scn.sap.com/docs/DOC-8218
Acknowledgments to Security Researchers - Security and Identity Management - SCN Wiki
-
http://seclists.org/fulldisclosure/2014/Jul/152
Full Disclosure: [Onapsis Security Advisory 2014-024] Hard-coded Username in SAP FI Manager Self-Service
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/94923
SAP FI Manager Self-Service default account CVE-2014-5176 Vulnerability Report
-
http://www.securityfocus.com/archive/1/532945/100/0/threaded
SecurityFocus
Jump to