Lucene search

K
cve[email protected]CVE-2022-29614
HistoryJun 14, 2022 - 7:15 p.m.

CVE-2022-29614

2022-06-1419:15:07
CWE-269
web.nvd.nist.gov
48
6
cve-2022-29614
sap
startservice
privilege escalation
vulnerability
netweaver
abap
java
hana
s-bit helper
unix
sapuxuserchk

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

5 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

20.8%

SAP startservice - of SAP NetWeaver Application Server ABAP, Application Server Java, ABAP Platform and HANA Database - versions KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, SAPHOSTAGENT 7.22, - on Unix systems, s-bit helper program sapuxuserchk, can be abused physically resulting in a privilege escalation of an attacker leading to low impact on confidentiality and integrity, but a profound impact on availability.

Affected configurations

NVD
Node
saphost_agentMatch7.22
OR
sapnetweaver_abapMatchkernel_7.22
OR
sapnetweaver_abapMatchkernel_7.49
OR
sapnetweaver_abapMatchkernel_7.53
OR
sapnetweaver_abapMatchkernel_7.77
OR
sapnetweaver_abapMatchkernel_7.81
OR
sapnetweaver_abapMatchkernel_7.85
OR
sapnetweaver_abapMatchkernel_7.86
OR
sapnetweaver_abapMatchkernel_7.87
OR
sapnetweaver_abapMatchkernel_7.88
OR
sapnetweaver_abapMatchkrnl64nuc_7.22
OR
sapnetweaver_abapMatchkrnl64nuc_7.22ext
OR
sapnetweaver_abapMatchkrnl64uc_7.22
OR
sapnetweaver_abapMatchkrnl64uc_7.22ext
OR
sapnetweaver_abapMatchkrnl64uc_7.49
OR
sapnetweaver_abapMatchkrnl64uc_7.53

CNA Affected

[
  {
    "product": "SAP NetWeaver AS ABAP, AS Java, ABAP Platform and HANA Database",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "KERNEL 7.22"
      },
      {
        "status": "affected",
        "version": "7.49"
      },
      {
        "status": "affected",
        "version": "7.53"
      },
      {
        "status": "affected",
        "version": "7.77"
      },
      {
        "status": "affected",
        "version": "7.81"
      },
      {
        "status": "affected",
        "version": "7.85"
      },
      {
        "status": "affected",
        "version": "7.86"
      },
      {
        "status": "affected",
        "version": "7.87"
      },
      {
        "status": "affected",
        "version": "7.88"
      },
      {
        "status": "affected",
        "version": "KRNL64NUC 7.22"
      },
      {
        "status": "affected",
        "version": "7.22EXT"
      },
      {
        "status": "affected",
        "version": "KRNL64UC 7.22"
      },
      {
        "status": "affected",
        "version": "SAPHOSTAGENT 7.22"
      }
    ]
  }
]

Social References

More

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

5 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

20.8%

Related for CVE-2022-29614