The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: sap

Published: 2023-08-08T00:46:40.819Z

Updated: 2023-08-08T00:46:40.819Z

Reserved: 2023-07-06T14:57:18.510Z


Link: CVE-2023-37491

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-08-08T01:15:18.840

Modified: 2023-08-09T18:20:38.800


Link: CVE-2023-37491

JSON object: View

cve-icon Redhat Information

No data.

CWE