Input Validation Flaw in SAP NetWeaver AS for ABAP by SAP
CVE-2021-27633
7.5HIGH
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 9 June 2021
Summary
An input validation vulnerability in SAP NetWeaver AS for ABAP enables unauthenticated attackers to trigger an internal error by sending specially crafted packets over the network. This vulnerability affects multiple versions and can lead to system crashes, rendering the service unavailable without exposing or modifying data.
Affected Version(s)
SAP NetWeaver AS for ABAP (RFC Gateway) < KRNL32NUC - 7.22 < KRNL32NUC - 7.22
SAP NetWeaver AS for ABAP (RFC Gateway) < 7.22EXT < 7.22EXT
SAP NetWeaver AS for ABAP (RFC Gateway) < KRNL64NUC - 7.22 < KRNL64NUC - 7.22
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved