Known Issues for Security

Learn about known issues and apply workarounds for SAP Mobile Platform security.

Issue #Description
SMPONP-13496
HTTPS port has SSLv3/TLS renegotiation vulnerability

The SAP Control Center HTTPS port (default value is 8283) is susceptible to the SSLv3/TLS renegotiation vulnerability. The way in which SSL and TLS protocols handle renegotiation requests may allow an attacker to inject plaintext into an application protocol stream, resulting in a situation where the attacker may be able to issue commands to the server that appear to be coming from a legitimate source.

Workaround: Fixed in 2.3 SP04. Upgrade is recommended.

SMPONP-12442
Changes to SQL Anywhere Server and Utility

See SQL Anywhere Servers and Utilities Use OpenSSL.

RTC-60
SAP Mobile Server restart is needed after changing keystore.

Workaround: If you change anything relating to keys or certificates in the keystore, you must always restart the server. Changes only take effect after a server restart.

CR-708833
External authentication token is not properly handled by iOS Hybrid Web Container (HWC).

Workaround: For an external token to be passed to and used by iOS Hybrid Web Container for performing single sign-on (SSO), make the call to setHttpHeaders before starting the client engine by placing [self setHttpHeaders] in the first line in the startEngine function. See Setting HTTP Headers in Developer Guide: Hybrid App Packages.