Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability.
2022-06-14T17:15:08.177
2024-11-21T06:56:08.280
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sap | netweaver_as_abap | kernel_7.49 | Yes |
Application | sap | netweaver_as_abap | kernel_7.77 | Yes |
Application | sap | netweaver_as_abap | kernel_7.81 | Yes |
Application | sap | netweaver_as_abap | kernel_7.85 | Yes |
Application | sap | netweaver_as_abap | kernel_7.86 | Yes |
Application | sap | netweaver_as_abap | kernel_7.87 | Yes |
Application | sap | netweaver_as_abap | kernel_7.88 | Yes |
Application | sap | netweaver_as_abap_krnl64nuc | 7.49 | Yes |
Application | sap | netweaver_as_abap_krnl64uc | 7.49 | Yes |
Application | sap | router | 7.22 | Yes |
Application | sap | router | 7.53 | Yes |