{"api_version":"1","generated_at":"2026-04-23T09:40:13+00:00","cve":"CVE-2021-38177","urls":{"html":"https://cve.report/CVE-2021-38177","api":"https://cve.report/api/cve/CVE-2021-38177.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-38177","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-38177"},"summary":{"title":"CVE-2021-38177","description":"SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high impact on the availability of the SAP system.","state":"PUBLIC","assigner":"cna@sap.com","published_at":"2021-09-14 12:15:00","updated_at":"2022-01-28 21:01:00"},"problem_types":["CWE-476"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2022/Jan/74","name":"20220126 Onapsis Security Advisory 2021-0025: Null Pointer Dereference vulnerability in SAP CommonCryptoLib","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: Onapsis Security Advisory 2021-0025: Null Pointer Dereference vulnerability in SAP CommonCryptoLib","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html","name":"http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html","refsource":"MISC","tags":[],"title":"SAP CommonCryptoLib Null Pointer Dereference ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405","name":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405","refsource":"MISC","tags":[],"title":"SAP Security Patch Day – September 2021 - Product Security Response at SAP - Community Wiki","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://launchpad.support.sap.com/#/notes/3051787","name":"https://launchpad.support.sap.com/#/notes/3051787","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-38177","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38177","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"38177","vulnerable":"1","versionEndIncluding":"8.5.38","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sap","cpe5":"commoncryptolib","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-38177","ASSIGNER":"cna@sap.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"SAP SE","product":{"product_data":[{"product_name":"SAP CommonCryptoLib","version":{"version_data":[{"version_name":"<","version_value":"8.5.38 or lower"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high impact on the availability of the SAP system."}]},"impact":{"cvss":{"baseScore":"7.5","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Null Pointer Dereference"}]}]},"references":{"reference_data":[{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405","refsource":"MISC","name":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405"},{"url":"https://launchpad.support.sap.com/#/notes/3051787","refsource":"MISC","name":"https://launchpad.support.sap.com/#/notes/3051787"},{"refsource":"FULLDISC","name":"20220126 Onapsis Security Advisory 2021-0025: Null Pointer Dereference vulnerability in SAP CommonCryptoLib","url":"http://seclists.org/fulldisclosure/2022/Jan/74"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html","url":"http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html"}]}},"nvd":{"publishedDate":"2021-09-14 12:15:00","lastModifiedDate":"2022-01-28 21:01:00","problem_types":["CWE-476"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sap:commoncryptolib:*:*:*:*:*:*:*:*","versionEndIncluding":"8.5.38","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"38177","Ordinal":"213790","Title":"CVE-2021-38177","CVE":"CVE-2021-38177","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"38177","Ordinal":"1","NoteData":"SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high impact on the availability of the SAP system.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"38177","Ordinal":"2","NoteData":"2021-09-14","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"38177","Ordinal":"3","NoteData":"2022-01-27","Type":"Other","Title":"Modified"}]}}}