SAP Knowledge Base Article - Preview

3500037 - Impact of SMBv2 signing Vulnerability

Symptom

  • The system gets enabled, but does not require SMB signing, The SMB signing allows the recipient of SMB packets to confirm their authenticity and helps prevent man in the middle attacks against SMB.
  • SMB 2.x signing can be configured in one of two ways: not required (least secure) and required (most secure)


Read more...

Environment

SAP BusinessObjects Business Intelligence Platform/BI (4.x)

OS: Windows

Product

SAP BusinessObjects Business Intelligence platform 4.3

Keywords

SMB, Vulnerability, Configuration, 4.2, 4.2, BI, BO, SMB 2.X, Packets , KBA , BI-BIP-SEC , Security Vulnerabilities in SAP BusinessObjects , BI-BIP-DEP , Webapp Deployment, Networking, Vulnerabilities, Webservices , Known Error

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.