Description
Exploiting weak/predictable user credentials is one of the most common and successful attack scenarios used against SAP systems. During the installation, SAP systems create the standard users SAP*, DDIC and EARLYWATCH. Acunetix WVS tried the default passwords for these standard users (and other commonly used SAP users) and managed to guess a set of credentials that were accepted by the SAP system.
Remediation
To protect standard SAP users from unauthorized use:
- Define a new superuser and deactivate SAP*.
- Change all of the default passwords for these users.
References
Related Vulnerabilities
Delve Debugger Unauthorized Access Vulnerability
WordPress Plugin WP-RecentComments Information Disclosure (2.2.7)
WordPress Plugin Slack-Chat Information Disclosure (1.5.5)
WordPress Plugin Unyson Information Disclosure (2.7.18)
Plone CMS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-5492)