Lucene search

K
cvelistSapCVELIST:CVE-2021-27634
HistoryJun 09, 2021 - 12:00 a.m.

CVE-2021-27634

2021-06-0900:00:00
CWE-787
sap
www.cve.org

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.4%

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method ThCpicDtCreate () causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.

CNA Affected

[
  {
    "vendor": "SAP SE",
    "product": "SAP NetWeaver AS for ABAP (RFC Gateway)",
    "versions": [
      {
        "version": "< KRNL32NUC - 7.22",
        "status": "affected"
      },
      {
        "version": "< 7.22EXT",
        "status": "affected"
      },
      {
        "version": "< KRNL64NUC - 7.22",
        "status": "affected"
      },
      {
        "version": "< 7.49",
        "status": "affected"
      },
      {
        "version": "< KRNL64UC - 8.04",
        "status": "affected"
      },
      {
        "version": "< 7.22",
        "status": "affected"
      },
      {
        "version": "< 7.53",
        "status": "affected"
      },
      {
        "version": "< 7.73",
        "status": "affected"
      },
      {
        "version": "< KERNEL - 7.22",
        "status": "affected"
      },
      {
        "version": "< 8.04",
        "status": "affected"
      },
      {
        "version": "< 7.77",
        "status": "affected"
      },
      {
        "version": "< 7.81",
        "status": "affected"
      },
      {
        "version": "< 7.82",
        "status": "affected"
      },
      {
        "version": "< 7.83",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.4%

Related for CVELIST:CVE-2021-27634