This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sap First view 2015-01-22
Product Netweaver Abap Last view 2024-08-13
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:sap:netweaver_abap:750:*:*:*:*:*:*:* 9
cpe:2.3:a:sap:netweaver_abap:740:*:*:*:*:*:*:* 9
cpe:2.3:a:sap:netweaver_abap:751:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:755:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:731:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:754:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:702:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:752:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:753:*:*:*:*:*:*:* 7
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22ext:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:701:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:700:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:kernel_7.53:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.53:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:kernel_7.22:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:730:*:*:*:*:*:*:* 6
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.49:*:*:*:*:*:*:* 5
cpe:2.3:a:sap:netweaver_abap:kernel_8.04:*:*:*:*:*:*:* 5
cpe:2.3:a:sap:netweaver_abap:kernel_7.49:*:*:*:*:*:*:* 5
cpe:2.3:a:sap:netweaver_abap:krnl64uc_8.04:*:*:*:*:*:*:* 5
cpe:2.3:a:sap:netweaver_abap:756:*:*:*:*:*:*:* 5
cpe:2.3:a:sap:netweaver_abap:kernel_7.77:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:kernel_7.85:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.73:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.49:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.22ext:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:kernel_7.73:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.22:*:*:*:*:*:*:* 3
cpe:2.3:a:sap:netweaver_abap:kernel_7.93:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:711:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:710:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:kernel_7.54:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:kernel_7.81:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:kernel_7.89:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:7.22ext:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:kernel_7.88:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:7.81:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:7.77:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:7.53:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:7.49:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:7.22:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:kernel_7.86:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:kernel_7.87:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:804:*:*:*:*:*:*:* 2
cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.21:*:*:*:*:*:*:* 1
cpe:2.3:a:sap:netweaver_abap:785:*:*:*:*:*:*:* 1
cpe:2.3:a:sap:netweaver_abap:786:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
6.3 2024-08-13 CVE-2024-33005

Due to the missing authorization checks in the local systems, the admin users of SAP Web Dispatcher, SAP NetWeaver Application Server (ABAP and Java), and SAP Content Server can impersonate other users and may perform some unintended actions. This could lead to a low impact on confidentiality and a high impact on the integrity and availability of the applications.

5 2022-06-14 CVE-2022-29614

SAP startservice - of SAP NetWeaver Application Server ABAP, Application Server Java, ABAP Platform and HANA Database - versions KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, SAPHOSTAGENT 7.22, - on Unix systems, s-bit helper program sapuxuserchk, can be abused physically resulting in a privilege escalation of an attacker leading to low impact on confidentiality and integrity, but a profound impact on availability.

4.3 2022-06-14 CVE-2022-29612

SAP NetWeaver, ABAP Platform and SAP Host Agent - versions KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, 8.04, KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, 8.04, SAPHOSTAGENT 7.22, allows an authenticated user to misuse a function of sapcontrol webfunctionality(startservice) in Kernel which enables malicious users to retrieve information. On successful exploitation, an attacker can obtain technical information like system number or physical address, which is otherwise restricted, causing a limited impact on the confidentiality of the application.

4.7 2022-04-12 CVE-2022-28215

SAP NetWeaver ABAP Server and ABAP Platform - versions 740, 750, 787, allows an unauthenticated attacker to redirect users to a malicious site due to insufficient URL validation. This could lead to the user being tricked to disclose personal information.

4.9 2022-02-09 CVE-2022-22545

A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756.

7.5 2022-02-09 CVE-2022-22543

SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected.

4.3 2022-01-14 CVE-2021-42067

In SAP NetWeaver AS for ABAP and ABAP Platform - versions 701, 702, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 786, an attacker authenticated as a regular user can use the S/4 Hana dashboard to reveal systems and services which they would not normally be allowed to see. No information alteration or denial of service is possible.

4.3 2021-10-12 CVE-2021-40496

SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details.

5.3 2021-10-12 CVE-2021-40495

There are multiple Denial-of Service vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755. An unauthorized attacker can use the public SICF service /sap/public/bc/abap to reduce the performance of SAP NetWeaver Application Server ABAP and ABAP Platform.

7.5 2021-10-12 CVE-2021-38181

SAP NetWeaver AS ABAP and ABAP Platform - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.

8.8 2021-10-12 CVE-2021-38178

The software logistics system of SAP NetWeaver AS ABAP and ABAP Platform versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, enables a malicious user to transfer ABAP code artifacts or content, by-passing the established quality gates. By this vulnerability malicious code can reach quality and production, and can compromise the confidentiality, integrity, and availability of the system and its data.

5.3 2021-07-14 CVE-2021-33684

SAP NetWeaver AS ABAP and ABAP Platform, versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.77, 7.81, 7.84, allows an attacker to send overlong content in the RFC request type thereby crashing the corresponding work process because of memory corruption vulnerability. The work process will attempt to restart itself after the crash and hence the impact on the availability is low.

7.5 2021-07-14 CVE-2021-33677

SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 702, 730, 731, 804, 740, 750, 784, expose functions to external which can lead to information disclosure.

9.8 2021-06-16 CVE-2021-27610

SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 804, does not create information about internal and external RFC user in consistent and distinguished format, which could lead to improper authentication and may be exploited by malicious users to obtain illegitimate access to the system.

5.9 2021-06-09 CVE-2021-27634

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method ThCpicDtCreate () causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.

7.5 2021-06-09 CVE-2021-27633

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method ThCPIC() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.

7.5 2021-06-09 CVE-2021-27597

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method memmove() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.

5 2015-01-22 CVE-2015-1309

XML external entity vulnerability in the Extended Computer Aided Test Tool (eCATT) in SAP NetWeaver AS ABAP 7.31 and earlier allows remote attackers to access arbitrary files via a crafted XML request, related to ECATT_DISPLAY_XMLSTRING_REMOTE, aka SAP Note 2016638.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-787 Out-of-bounds Write
50% (1) CWE-287 Improper Authentication