Input Validation Flaw in SAP NetWeaver ABAP Server and ABAP Platform
CVE-2021-27629

7.5HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
9 June 2021

Summary

SAP NetWeaver ABAP Server and ABAP Platform have a critical input validation error in the Enqueue Server that allows unauthenticated attackers to exploit the system. By sending a specially crafted packet over the network, an attacker can induce an internal error by invoking the method EncPSetUnsupported(). This flaw leads to a system crash, making the server inaccessible. Importantly, no data within the system can be accessed or altered during this vulnerability, thereby emphasizing the urgent need for patching affected versions to uphold system integrity.

Affected Version(s)

SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server) < KRNL32NUC - 7.22 < KRNL32NUC - 7.22

SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server) < 7.22EXT < 7.22EXT

SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server) < KRNL64NUC - 7.22 < KRNL64NUC - 7.22

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.