CVE-2023-37484

SAP PowerDesigner - version 16.7, queries all password hashes in the backend database and compares it with the user provided one during login attempt, which might allow an attacker to access password hashes from the client's memory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:powerdesigner:16.7:*:*:*:*:*:*:*

History

21 Nov 2024, 08:11

Type Values Removed Values Added
References () https://me.sap.com/notes/3341460 - Permissions Required () https://me.sap.com/notes/3341460 - Permissions Required
References () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory

26 Sep 2024, 19:15

Type Values Removed Values Added
CWE CWE-200 CWE-327
Summary (en) SAP PowerDesigner - version 16.7, queries all password hashes in the backend database and compares it with the user provided one during login attempt, which might allow an attacker to access password hashes from the client's memory. (en) SAP PowerDesigner - version 16.7, queries all password hashes in the backend database and compares it with the user provided one during login attempt, which might allow an attacker to access password hashes from the client's memory.

Information

Published : 2023-08-08 01:15

Updated : 2024-11-21 08:11


NVD link : CVE-2023-37484

Mitre link : CVE-2023-37484

CVE.ORG link : CVE-2023-37484


JSON object : View

Products Affected

sap

  • powerdesigner
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm