CVE-2016-6144
Published on: 08/05/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:12 PM UTC
Certain versions of Hana from Sap contain the following vulnerability:
The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869.
- CVE-2016-6144 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 8.1 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | HIGH | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
SAP HANA SYSTEM User Brute Force Attack | Onapsis | Permissions Required www.onapsis.com text/html |
![]() |
Full Disclosure: Onapsis Security Advisory ONAPSIS-2016-026: SAP HANA SYSTEM user brute force attack | seclists.org text/html |
![]() |
SAP HANA DB 1.00.73.00.389160 SYSTEM User Brute Force ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
Onapsis Publishes 15 Advisories for SAP HANA and Building Components | Onapsis | Third Party Advisory www.onapsis.com text/html |
![]() |
Malformed Request | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Sap | Hana | All | All | All | All |
- cpe:2.3:a:sap:hana:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE