CVE-2022-22543
Summary
| CVE | CVE-2022-22543 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-09 23:15:00 UTC |
| Updated | 2022-10-25 20:39:00 UTC |
| Description | SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected. |
Risk And Classification
Problem Types: CWE-400
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Netweaver Abap | 7.22 | All | All | All |
| Application | Sap | Netweaver Abap | 7.22ext | All | All | All |
| Application | Sap | Netweaver Abap | 7.49 | All | All | All |
| Application | Sap | Netweaver Abap | 7.53 | All | All | All |
| Application | Sap | Netweaver Abap | 7.77 | All | All | All |
| Application | Sap | Netweaver Abap | 7.81 | All | All | All |
| Application | Sap | Netweaver Abap | 7.85 | All | All | All |
| Application | Sap | Netweaver Abap | 7.86 | All | All | All |
| Application | Sap | Netweaver Abap | 7.87 | All | All | All |
| Application | Sap | Netweaver Abap | 8.04 | All | All | All |
| Application | Sap | Netweaver Abap | krnl64nuc_7.22 | All | All | All |
| Application | Sap | Netweaver Abap | krnl64nuc_8.04 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.22 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.22ext | All | All | All |
| Application | Sap | Netweaver As Abap | 7.49 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.53 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.77 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.81 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.85 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.86 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.87 | All | All | All |
| Application | Sap | Netweaver As Abap | 8.04 | All | All | All |
| Application | Sap | Netweaver As Abap | krnl64nuc_7.22 | All | All | All |
| Application | Sap | Netweaver As Abap | krnl64nuc_8.04 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SAP Security Patch Day - February 2022 - Product Security Response at SAP - Community Wiki | MISC | wiki.scn.sap.com | |
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | |
| Access Denied | MISC | www.sap.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.