CVE-2016-6144

Published on: 08/05/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Hana from Sap contain the following vulnerability:

The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869.

  • CVE-2016-6144 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
SAP HANA SYSTEM User Brute Force Attack | Onapsis Permissions Required
www.onapsis.com
text/html
URL Logo MISC www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack
Full Disclosure: Onapsis Security Advisory ONAPSIS-2016-026: SAP HANA SYSTEM user brute force attack seclists.org
text/html
URL Logo FULLDISC 20160819 Onapsis Security Advisory ONAPSIS-2016-026: SAP HANA SYSTEM user brute force attack
SAP HANA DB 1.00.73.00.389160 SYSTEM User Brute Force ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html
Onapsis Publishes 15 Advisories for SAP HANA and Building Components | Onapsis Third Party Advisory
www.onapsis.com
text/html
URL Logo MISC www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components
Malformed Request Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92065

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSapHanaAllAllAllAll
  • cpe:2.3:a:sap:hana:*:*:*:*:*:*:*:*: