SAP ERPMedium

SAP Two-Factor Authentication Soft-Token Cloning

By exploiting this vulnerability, an attacker who previously accessed a mobile phone connected to an SAP system could potentially access all the business information stored and processed in the SAP system.

Please fill out the form to download the security advisory.