CVE-2022-27668
Summary
| CVE | CVE-2022-27668 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-06-14 17:15:00 UTC |
| Updated | 2022-10-27 19:11:00 UTC |
| Description | Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability. |
Risk And Classification
Problem Types: CWE-863
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Netweaver As Abap | kernel_7.49 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_7.77 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_7.81 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_7.85 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_7.86 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_7.87 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_7.88 | All | All | All |
| Application | Sap | Netweaver As Abap Krnl64nuc | 7.49 | All | All | All |
| Application | Sap | Netweaver As Abap Krnl64uc | 7.49 | All | All | All |
| Application | Sap | Router | 7.22 | All | All | All |
| Application | Sap | Router | 7.53 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SAP SAProuter Improper Access Control ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Access Denied | MISC | www.sap.com | |
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | |
| Full Disclosure: SEC Consult SA-20220914-0 :: Improper Access Control in SAP® SAProuter | FULLDISC | seclists.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.