More than 40,000 SAP users of an estimated 2,500 internet facing systems should move quickly to patch a Remotely Exploitable Code On NetWeaver (RECON) vulnerability that scored a 10 out of 10 on the bug-severity CVSS scale and which could give an attacker full enterprise control.
Noting that “this is the second major Java-based 0-day in the wild in as many weeks targeting widely deployed, Internet-facing critical software,” Casey Ellis, CTO and founder at Bugcrowd, said “the challenge of critical bugs is that traditional approaches may take days or even weeks to discover all exploitable instances of the vulnerability.”
Even in those cases where a patch is forthcoming, as with this vulnerability, “successfully ensuring every application is patched becomes a race against malicious actors that know exactly what software they should be targeting,” Ellis said.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.