{ "id": "CVE-2020-6304", "sourceIdentifier": "cna@sap.com", "published": "2020-01-14T18:15:11.883", "lastModified": "2020-01-24T13:15:31.310", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper input validation in SAP NetWeaver Internet Communication Manager (update provided in KRNL32NUC & KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT KRNL64NUC & KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49 KERNEL 7.21, 7.49, 7.53) allows an attacker to prevent users from accessing its services through a denial of service." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en SAP NetWeaver Internet Communication Manager (actualizaci\u00f3n proporcionada en KRNL32NUC & KRNL32UC versiones 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC & KRNL64UC versiones 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KERNEL versiones 7.21, 7.49, 7.53), permite a un atacante impedir a usuarios acceder a sus servicios por medio de una denegaci\u00f3n de servicio." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV30": [ { "source": "cna@sap.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B557198D-FFA8-48F9-8177-F7ED9987FE56" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC113C9D-0EE4-4D1B-BAEA-6DAB978AA866" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.49:*:*:*:*:*:*:*", "matchCriteriaId": "99BD1DB2-C4AB-4B84-91D3-E464FDAF9283" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.53:*:*:*:*:*:*:*", "matchCriteriaId": "A0AF7D4B-53AD-410D-9E0F-643ADEF3E87F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.21:*:*:*:*:*:*:*", "matchCriteriaId": "C5011C94-80BC-477B-8EB7-3B38D137FB09" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.21ext:*:*:*:*:*:*:*", "matchCriteriaId": "693E07D7-77E3-4061-B745-EC7B03EA343D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.22:*:*:*:*:*:*:*", "matchCriteriaId": "487354B0-CEF2-45BF-9858-BF030D4BAD86" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.22ext:*:*:*:*:*:*:*", "matchCriteriaId": "BF766808-846D-44EF-8260-B76235FF746D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.21:*:*:*:*:*:*:*", "matchCriteriaId": "46755D71-2911-481D-94E0-1CC362686B5F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.21ext:*:*:*:*:*:*:*", "matchCriteriaId": "FD152AEC-38B3-4757-8D2B-AB763F22F9BD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.22:*:*:*:*:*:*:*", "matchCriteriaId": "417622D6-DCE5-45DC-A0AE-C268D8A50C41" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.22ext:*:*:*:*:*:*:*", "matchCriteriaId": "86405BAF-8A6C-497C-B271-5CF244C075CB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.21:*:*:*:*:*:*:*", "matchCriteriaId": "CD69E68D-B0EF-4F03-9541-DAB67F9CA9C7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.21ext:*:*:*:*:*:*:*", "matchCriteriaId": "80F7529C-83B6-4D4A-A553-E32260B311BF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.22:*:*:*:*:*:*:*", "matchCriteriaId": "CA479004-8ABC-4045-920C-6C459978E633" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.22ext:*:*:*:*:*:*:*", "matchCriteriaId": "7A420060-5BB2-4307-8A39-82E3C3211CBC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.49:*:*:*:*:*:*:*", "matchCriteriaId": "1E6AF29F-290B-440E-8047-A5D8007B119D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.21:*:*:*:*:*:*:*", "matchCriteriaId": "A15CCCE2-BB24-434B-85DF-EBD1FD2A5715" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.21ext:*:*:*:*:*:*:*", "matchCriteriaId": "5522AC70-0FB4-4DA8-BDC6-463E1F78F993" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.22:*:*:*:*:*:*:*", "matchCriteriaId": "E0FCDFCF-A549-43EC-BFF7-B1A650F5CC99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.22ext:*:*:*:*:*:*:*", "matchCriteriaId": "63E8ECCB-9AD0-4EEC-880F-2373F4ACBECE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.49:*:*:*:*:*:*:*", "matchCriteriaId": "E1B76177-38D4-47CE-85CF-8B78DD368DE9" } ] } ] } ], "references": [ { "url": "https://launchpad.support.sap.com/#/notes/2848498", "source": "cna@sap.com", "tags": [ "Permissions Required" ] }, { "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=533671771", "source": "cna@sap.com", "tags": [ "Vendor Advisory" ] } ] }