Identified as HotNews SAP Note #2934135 (CVE-2020-6287) in the July 2020 SAP Security Notes, the RECON (Remotely Exploitable Code On NetWeaver) vulnerability has a CVSS score of 10 out of 10 (the most severe) and can potentially be exploited impacting the confidentiality, integrity and availability of mission-critical SAP applications.
A successful exploit of RECON could give an unauthenticated attacker full access to the affected SAP system. This includes the ability to modify financial records, steal personally identifiable information (PII) from employees, customers and suppliers, corrupt data, delete or modify logs and traces and other actions that put essential business operations, cybersecurity and regulatory compliance at risk.
The RECON vulnerability affects a default component present in every SAP application running the SAP NetWeaver Java technology stack. This technical component is used in many SAP business solutions, including SAP SCM, SAP CRM, SAP PI, SAP Enterprise Portal and SAP Solution Manager (SolMan), impacting more than 40,000 SAP customers.
To learn more about the RECON vulnerability, download the full Onapsis Threat Report now and read the FAQs below.
For more information about Onapsis’s Cyber Risk Assessment and how we can help you determine your level of risk for the RECON vulnerability, download our executive brief.