Lucene search

K
cvelistSapCVELIST:CVE-2023-27268
HistoryMar 14, 2023 - 4:57 a.m.

CVE-2023-27268 Improper Access Control in SAP NetWeaver AS Java (Object Analyzing Service)

2023-03-1404:57:30
CWE-284
sap
www.cve.org
6
cve-2023-27268
sap netweaver
access control
authorization checks
unauthenticated attacker
naming api
directory api
privilege escalation

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

36.0%

SAP NetWeaver AS Java (Object Analyzing Service) - version 7.50, does not perform necessary authorization checks, allowing an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability., resulting in escalation of privileges.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "NetWeaver AS Java (Object Analyzing Service)",
    "vendor": "SAP",
    "versions": [
      {
        "status": "affected",
        "version": "7.50"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

36.0%

Related for CVELIST:CVE-2023-27268