Vulnerability Details : CVE-2003-1035
The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
Exploit prediction scoring system (EPSS) score for CVE-2003-1035
Probability of exploitation activity in the next 30 days: 1.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-1035
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-1035
Products affected by CVE-2003-1035
- cpe:2.3:a:sap:sap_r_3:*:*:*:*:*:*:*:*
- cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*
- cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*