The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3344295 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: sap
Published: 2023-08-08T00:46:40.819Z
Updated: 2023-08-08T00:46:40.819Z
Reserved: 2023-07-06T14:57:18.510Z
Link: CVE-2023-37491
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-08-08T01:15:18.840
Modified: 2023-08-09T18:20:38.800
Link: CVE-2023-37491
JSON object: View
Redhat Information
No data.
CWE