Lucene search

K
cve[email protected]CVE-2023-37491
HistoryAug 08, 2023 - 1:15 a.m.

CVE-2023-37491

2023-08-0801:15:18
CWE-285
web.nvd.nist.gov
25
sap
message server
acl
bypass
kernel 7.22
kernel 7.53
kernel 7.54
kernel 7.77
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

The ACL (AccessΒ ControlΒ List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.

Affected configurations

NVD
Node
sapmessage_serverMatchkernel_7.22
OR
sapmessage_serverMatchkernel_7.53
OR
sapmessage_serverMatchkernel_7.54
OR
sapmessage_serverMatchkernel_7.77
OR
sapmessage_serverMatchkrnl64nuc_7.22
OR
sapmessage_serverMatchkrnl64nuc_7.22ex
OR
sapmessage_serverMatchrnl64uc_7.22
OR
sapmessage_serverMatchrnl64uc_7.22ext
OR
sapmessage_serverMatchrnl64uc_7.53

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP Message Server",
    "vendor": "SAP_SE",
    "versions": [
      {
        "status": "affected",
        "version": "KERNEL 7.22"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.53"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.54"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.77"
      },
      {
        "status": "affected",
        "version": "RNL64UC 7.22"
      },
      {
        "status": "affected",
        "version": "RNL64UC 7.22EXT"
      },
      {
        "status": "affected",
        "version": "RNL64UC 7.53"
      },
      {
        "status": "affected",
        "version": "KRNL64NUC 7.22"
      },
      {
        "status": "affected",
        "version": "KRNL64NUC 7.22EXT"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

Related for CVE-2023-37491