CVE-2019-0283
7.1HIGH
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 10 April 2019
Summary
SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document.
Affected Version(s)
SAP NetWeaver Process Integration (Adapter Engine) < from 7.10 to 7.11 < from 7.10 to 7.11
SAP NetWeaver Process Integration (Adapter Engine) < 7.30 < 7.30
SAP NetWeaver Process Integration (Adapter Engine) < 7.31 < 7.31
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved