logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2020-6287: Critical Vulnerability in SAP NetWeaver Application Server (AS) Java

Description

SAP NetWeaver AS JAVA (LM Configuration Wizard), versions – 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system, leading to Missing Authentication Check. **Recent assessments:** **ccondon-r7** at July 14, 2020 7:10am UTC reported: This is an incredibly attractive and simple attack target: It’s an easily exploitable vulnerability in a highly-exposed HTTP interface (frequently user- and internet-facing) where successful exploitation allows remote, unauthenticated attackers to create user accounts with the highest possible privileges and generally declare themselves the feudal lords of critical SAP estates. It’s difficult to imagine that widespread exploitation would take much time at all. SAP included a mitigation in the patch release details, but with so many mitigation bypasses coming out for other recent critical vulns, it’s definitely advisable to [take CISA’s guidance to heart](<https://us-cert.cisa.gov/ncas/alerts/aa20-195a#:~:text=On%20July%2013,%202020%20EST,%20SAP%20released%20the%20patch%20for,NetWeaver%20AS%20for%20Java%20component.&text=A%20remote,%20unauthenticated%20attacker%20can,cases,%20exposed%20to%20the%20internet>)—i.e., patch over mitigation wherever possible and as quickly as possible. **Mad-robot** at July 15, 2020 6:34pm UTC reported: This is an incredibly attractive and simple attack target: It’s an easily exploitable vulnerability in a highly-exposed HTTP interface (frequently user- and internet-facing) where successful exploitation allows remote, unauthenticated attackers to create user accounts with the highest possible privileges and generally declare themselves the feudal lords of critical SAP estates. It’s difficult to imagine that widespread exploitation would take much time at all. SAP included a mitigation in the patch release details, but with so many mitigation bypasses coming out for other recent critical vulns, it’s definitely advisable to [take CISA’s guidance to heart](<https://us-cert.cisa.gov/ncas/alerts/aa20-195a#:~:text=On%20July%2013,%202020%20EST,%20SAP%20released%20the%20patch%20for,NetWeaver%20AS%20for%20Java%20component.&text=A%20remote,%20unauthenticated%20attacker%20can,cases,%20exposed%20to%20the%20internet>)—i.e., patch over mitigation wherever possible and as quickly as possible. Assessed Attacker Value: 5 Assessed Attacker Value: 5Assessed Attacker Value: 5


Related