cve/2017/CVE-2017-16689.md

18 lines
930 B
Markdown
Raw Normal View History

2024-06-09 00:33:16 +00:00
### [CVE-2017-16689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16689)
![](https://img.shields.io/static/v1?label=Product&message=Trusted%20RFC%20connection&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Additional%20authentication%20check%20in%20Trusted%20RFC%20on%20same%20system&color=brighgreen)
### Description
A Trusted RFC connection in SAP KERNEL 32NUC, SAP KERNEL 32Unicode, SAP KERNEL 64NUC, SAP KERNEL 64Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49, can be established to a different client or a different user on the same system, although no explicit Trusted/Trusting Relation to the same system has been defined.
### POC
#### Reference
- https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/
#### Github
No PoCs found on GitHub currently.