Input Validation Flaw in SAP NetWeaver AS for ABAP by SAP
CVE-2021-27597

7.5HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
9 June 2021

Summary

The vulnerability in SAP NetWeaver AS for ABAP affects several versions due to an input validation error in the memmove() method. An unauthenticated attacker can exploit this flaw by sending a specially crafted packet, which may lead to an internal error and crash the system, rendering it unavailable. This attack does not allow for the viewing or modification of data within the system.

Affected Version(s)

SAP NetWeaver AS for ABAP (RFC Gateway) < KRNL32NUC - 7.22 < KRNL32NUC - 7.22

SAP NetWeaver AS for ABAP (RFC Gateway) < 7.22EXT < 7.22EXT

SAP NetWeaver AS for ABAP (RFC Gateway) < KRNL64NUC - 7.22 < KRNL64NUC - 7.22

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.