Lucene search

K
cvelistSapCVELIST:CVE-2021-27597
HistoryJun 09, 2021 - 12:00 a.m.

CVE-2021-27597

2021-06-0900:00:00
CWE-125
sap
www.cve.org
3
sap netweaver
abap
rfc gateway
unauthenticated
remote
crash
input validation
memmove
cve-2021-27597

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

44.1%

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method memmove() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.

CNA Affected

[
  {
    "vendor": "SAP SE",
    "product": "SAP NetWeaver AS for ABAP (RFC Gateway)",
    "versions": [
      {
        "version": "< KRNL32NUC - 7.22",
        "status": "affected"
      },
      {
        "version": "< 7.22EXT",
        "status": "affected"
      },
      {
        "version": "< KRNL64NUC - 7.22",
        "status": "affected"
      },
      {
        "version": "< 7.49",
        "status": "affected"
      },
      {
        "version": "< KRNL64UC - 8.04",
        "status": "affected"
      },
      {
        "version": "< 7.22",
        "status": "affected"
      },
      {
        "version": "< 7.53",
        "status": "affected"
      },
      {
        "version": "< 7.73",
        "status": "affected"
      },
      {
        "version": "< KERNEL - 7.22",
        "status": "affected"
      },
      {
        "version": "< 8.04",
        "status": "affected"
      },
      {
        "version": "< 7.77",
        "status": "affected"
      },
      {
        "version": "< 7.81",
        "status": "affected"
      },
      {
        "version": "< 7.82",
        "status": "affected"
      },
      {
        "version": "< 7.83",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

44.1%

Related for CVELIST:CVE-2021-27597