Description
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CiXMLIStreamRawBuffer::readRaw () which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Affected Software
Related
{"id": "CVE-2021-27624", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-27624", "description": "SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CiXMLIStreamRawBuffer::readRaw () which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.", "published": "2021-06-09T14:15:00", "modified": "2021-11-04T14:25:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.2, "impactScore": 3.6}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27624", "reporter": "cna@sap.com", "references": ["https://launchpad.support.sap.com/#/notes/3021050", "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999", "http://seclists.org/fulldisclosure/2021/Oct/31", "http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html"], "cvelist": ["CVE-2021-27624"], "immutableFields": [], "lastseen": "2022-03-23T16:12:21", "viewCount": 18, "enchantments": {"dependencies": {"references": [{"type": "githubexploit", "idList": ["0BF72729-44F7-545C-8475-3FBEB99370C9"]}], "rev": 4}, "score": {"value": 3.5, "vector": "NONE"}, "twitter": {"counter": 4, "modified": "2021-06-10T07:39:56", "tweets": [{"link": "https://twitter.com/WolfgangSesin/status/1404568159970078731", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-27624 (netweaver_as_internet_graphics_server)) has been published on https://t.co/NjYpYN4Ene?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1404568159970078731", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-27624 (netweaver_as_internet_graphics_server)) has been published on https://t.co/NjYpYN4Ene?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1404568214521143299", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-27624 (netweaver_as_internet_graphics_server)) has been published on https://t.co/nysmAEGBmL?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1404568214521143299", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-27624 (netweaver_as_internet_graphics_server)) has been published on https://t.co/nysmAEGBmL?amp=1"}]}, "backreferences": {"references": [{"type": "githubexploit", "idList": ["0BF72729-44F7-545C-8475-3FBEB99370C9"]}, {"type": "talos", "idList": ["SAP"]}]}, "exploitation": null, "vulnersScore": 3.5}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": "SAP SE", "cvss": {"3": {"vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "score": 5.9}}}, "cpe": ["cpe:/a:sap:netweaver_as_internet_graphics_server:7.20", "cpe:/a:sap:netweaver_as_internet_graphics_server:7.20ex2", "cpe:/a:sap:netweaver_as_internet_graphics_server:7.20ext", "cpe:/a:sap:netweaver_as_internet_graphics_server:7.53", "cpe:/a:sap:netweaver_as_internet_graphics_server:7.81"], "cpe23": ["cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20ext:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.81:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20ex2:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.53:*:*:*:*:*:*:*"], "cwe": ["CWE-20"], "affectedSoftware": [{"cpeName": "sap:netweaver_as_internet_graphics_server", "version": "7.20", "operator": "eq", "name": "sap netweaver as internet graphics server"}, {"cpeName": "sap:netweaver_as_internet_graphics_server", "version": "7.20ex2", "operator": "eq", "name": "sap netweaver as internet graphics server"}, {"cpeName": "sap:netweaver_as_internet_graphics_server", "version": "7.20ext", "operator": "eq", "name": "sap netweaver as internet graphics server"}, {"cpeName": "sap:netweaver_as_internet_graphics_server", "version": "7.53", "operator": "eq", "name": "sap netweaver as internet graphics server"}, {"cpeName": "sap:netweaver_as_internet_graphics_server", "version": "7.81", "operator": "eq", "name": "sap netweaver as internet graphics server"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20ex2:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20ext:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.53:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.81:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://launchpad.support.sap.com/#/notes/3021050", "name": "https://launchpad.support.sap.com/#/notes/3021050", "refsource": "MISC", "tags": ["Permissions Required", "Vendor Advisory"]}, {"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999", "refsource": "MISC", "tags": ["Vendor Advisory"]}, {"url": "http://seclists.org/fulldisclosure/2021/Oct/31", "name": "20211022 Onapsis Security Advisory 2021-0019: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP IGS service", "refsource": "FULLDISC", "tags": ["Mailing List", "Patch", "Third Party Advisory"]}, {"url": "http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html", "name": "http://packetstormsecurity.com/files/164598/SAP-NetWeaver-ABAP-IGS-Memory-Corruption.html", "refsource": "MISC", "tags": ["Patch", "Third Party Advisory", "VDB Entry"]}]}
{"githubexploit": [{"lastseen": "2022-02-23T18:02:37", "description": "# PewSWITCH\nA FreeSWITCH specific scanning and exploitation tool...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2021-11-28T13:12:38", "type": "githubexploit", "title": "Exploit for Improper Authentication in Freeswitch", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27624", "CVE-2021-41157", "CVE-2021-37624"], "modified": "2022-02-23T15:31:41", "id": "0BF72729-44F7-545C-8475-3FBEB99370C9", "href": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "privateArea": 1}]}