2023-08-08 02:00:33 +00:00
{
"id" : "CVE-2023-37491" ,
"sourceIdentifier" : "cna@sap.com" ,
"published" : "2023-08-08T01:15:18.840" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:11:49.420" ,
2024-09-28 23:58:16 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-08-08 02:00:33 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-09-28 23:58:16 +00:00
"value" : "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable."
2023-08-08 02:00:33 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-08-09 20:00:30 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "cna@sap.com" ,
"type" : "Secondary" ,
2023-08-09 20:00:30 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-08-09 20:00:30 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2023-08-09 20:00:30 +00:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-08-09 20:00:30 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.6 ,
2023-08-09 20:00:30 +00:00
"impactScore" : 5.9
} ,
2023-08-08 02:00:33 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-08-08 02:00:33 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-08-08 02:00:33 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2023-08-08 02:00:33 +00:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-08-08 02:00:33 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.8 ,
2023-08-08 02:00:33 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "cna@sap.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-08-08 02:00:33 +00:00
"description" : [
{
"lang" : "en" ,
2024-09-28 23:58:16 +00:00
"value" : "CWE-863"
2023-08-08 02:00:33 +00:00
}
]
}
] ,
2023-08-09 20:00:30 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:kernel_7.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5B5281B-885B-4121-9532-E3BDA2325273"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:kernel_7.53:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "253C27F5-F9DF-4A73-BEC4-1710A14DD008"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:kernel_7.54:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "231F8984-8AF6-4AA1-8E9E-0DA7860F70AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:kernel_7.77:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8066016B-B096-49F2-9DE1-A86C2B863AF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:krnl64nuc_7.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A1340C0-7CA8-4CE6-9E20-2ED434EBFD1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:krnl64nuc_7.22ex:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4FA177BA-4BEA-48C8-B142-8120E0112551"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:rnl64uc_7.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "992F4CF6-2ECD-41AF-923C-399C74E1F84D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:rnl64uc_7.22ext:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D95E9CA2-8B8A-47AF-BD8F-642F59783B4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:message_server:rnl64uc_7.53:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1875FA4-5448-47D5-9E86-416E2DFA5E6F"
}
]
}
]
}
] ,
2023-08-08 02:00:33 +00:00
"references" : [
{
"url" : "https://me.sap.com/notes/3344295" ,
2023-08-09 20:00:30 +00:00
"source" : "cna@sap.com" ,
"tags" : [
"Permissions Required"
]
2023-08-08 02:00:33 +00:00
} ,
{
"url" : "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" ,
2023-08-09 20:00:30 +00:00
"source" : "cna@sap.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://me.sap.com/notes/3344295" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Permissions Required"
]
} ,
{
"url" : "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-08-08 02:00:33 +00:00
}
]
}