157 lines
5.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-37491",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.840",
"lastModified": "2024-11-21T08:11:49.420",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:kernel_7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B5281B-885B-4121-9532-E3BDA2325273"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:kernel_7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "253C27F5-F9DF-4A73-BEC4-1710A14DD008"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:kernel_7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "231F8984-8AF6-4AA1-8E9E-0DA7860F70AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:kernel_7.77:*:*:*:*:*:*:*",
"matchCriteriaId": "8066016B-B096-49F2-9DE1-A86C2B863AF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:krnl64nuc_7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1340C0-7CA8-4CE6-9E20-2ED434EBFD1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:krnl64nuc_7.22ex:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA177BA-4BEA-48C8-B142-8120E0112551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:rnl64uc_7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "992F4CF6-2ECD-41AF-923C-399C74E1F84D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:rnl64uc_7.22ext:*:*:*:*:*:*:*",
"matchCriteriaId": "D95E9CA2-8B8A-47AF-BD8F-642F59783B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:message_server:rnl64uc_7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D1875FA4-5448-47D5-9E86-416E2DFA5E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3344295",
"source": "cna@sap.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://me.sap.com/notes/3344295",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}