The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3344295 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
https://me.sap.com/notes/3344295 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://me.sap.com/notes/3344295 - Permissions Required | |
References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
28 Sep 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable. | |
CWE | CWE-863 |
09 Aug 2023, 18:20
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://me.sap.com/notes/3344295 - Permissions Required | |
References | (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory | |
CPE | cpe:2.3:a:sap:message_server:kernel_7.77:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:rnl64uc_7.22ext:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:kernel_7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:rnl64uc_7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:rnl64uc_7.53:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:krnl64nuc_7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:kernel_7.53:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:kernel_7.54:*:*:*:*:*:*:* cpe:2.3:a:sap:message_server:krnl64nuc_7.22ex:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
08 Aug 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-08 01:15
Updated : 2024-11-21 08:11
NVD link : CVE-2023-37491
Mitre link : CVE-2023-37491
CVE.ORG link : CVE-2023-37491
JSON object : View
Products Affected
sap
- message_server
CWE
CWE-863
Incorrect Authorization