All the vulnerabilites related to sap - router
var-201404-0501
Vulnerability from variot
The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack. SAProuter is an SAP program that protects your SAP network from unauthorized access behavior. There is an information disclosure vulnerability in SAProuter. Allows an attacker to recover the privilege password of the plaintext routing table by exploiting a timed attack. SAProuter is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. There is a security vulnerability in the 'passwordCheck' function of SAP Router 721 patch 117, 720 patch 411 and 710 patch 029
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0501", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "router", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "721" }, { "model": "router", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "720" }, { "model": "router", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "710" }, { "model": "network interface router", "scope": "lte", "trust": 0.8, "vendor": "sap", "version": "(saprouter) 710 patch 029" }, { "model": "network interface router", "scope": "eq", "trust": 0.8, "vendor": "sap", "version": "(saprouter) 720 patch 411" }, { "model": "network interface router", "scope": "eq", "trust": 0.8, "vendor": "sap", "version": "(saprouter) 721 patch 117" }, { "model": "saprouter patch level", "scope": "eq", "trust": 0.6, "vendor": "sap", "version": "721117" }, { "model": "saprouter patch level", "scope": "eq", "trust": 0.6, "vendor": "sap", "version": "720411" }, { "model": "saprouter patch level", "scope": "eq", "trust": 0.6, "vendor": "sap", "version": "710029" }, { "model": "saprouter release patch le", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "721" }, { "model": "saprouter release patch le", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "720" }, { "model": "saprouter release patch le", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "710" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "router", "version": "710" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "router", "version": "720" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "router", "version": "721" } ], "sources": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "BID", "id": "66938" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "NVD", "id": "CVE-2014-0984" }, { "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:router:721:117:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:router:720:411:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:router:710:029:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0984" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Martin Gallo from Core Security Consulting Services", "sources": [ { "db": "BID", "id": "66938" } ], "trust": 0.3 }, "cve": "CVE-2014-0984", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-0984", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-02529", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7593d75a-1edc-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-68477", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-0984", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-02529", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201404-362", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-68477", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-0984", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "VULHUB", "id": "VHN-68477" }, { "db": "VULMON", "id": "CVE-2014-0984" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "NVD", "id": "CVE-2014-0984" }, { "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack. SAProuter is an SAP program that protects your SAP network from unauthorized access behavior. There is an information disclosure vulnerability in SAProuter. Allows an attacker to recover the privilege password of the plaintext routing table by exploiting a timed attack. SAProuter is prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. There is a security vulnerability in the \u0027passwordCheck\u0027 function of SAP Router 721 patch 117, 720 patch 411 and 710 patch 029", "sources": [ { "db": "NVD", "id": "CVE-2014-0984" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "BID", "id": "66938" }, { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-68477" }, { "db": "VULMON", "id": "CVE-2014-0984" } ], "trust": 2.79 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-68477", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=32919", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-68477" }, { "db": "VULMON", "id": "CVE-2014-0984" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0984", "trust": 3.7 }, { "db": "SECUNIA", "id": "57993", "trust": 1.2 }, { "db": "EXPLOIT-DB", "id": "32919", "trust": 1.2 }, { "db": "BID", "id": "66938", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201404-362", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2014-02529", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-002173", "trust": 0.8 }, { "db": "OSVDB", "id": "105967", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20140416 [CORE-2014-0003] - SAP ROUTER PASSWORD TIMING ATTACK", "trust": 0.6 }, { "db": "IVD", "id": "7593D75A-1EDC-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-86180", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126194", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-68477", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-0984", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "VULHUB", "id": "VHN-68477" }, { "db": "VULMON", "id": "CVE-2014-0984" }, { "db": "BID", "id": "66938" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "NVD", "id": "CVE-2014-0984" }, { "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "id": "VAR-201404-0501", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "VULHUB", "id": "VHN-68477" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" } ] }, "last_update_date": "2023-12-18T13:19:59.114000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP Security Note 1986895", "trust": 0.8, "url": "http://scn.sap.com/docs/doc-8218" }, { "title": "Patch for SAProuter Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/45053" }, { "title": "martingalloar", "trust": 0.1, "url": "https://github.com/martingalloar/martingalloar " }, { "title": "publications", "trust": 0.1, "url": "https://github.com/martingalloar/publications " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "VULMON", "id": "CVE-2014-0984" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-68477" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "NVD", "id": "CVE-2014-0984" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack" }, { "trust": 1.8, "url": "http://scn.sap.com/docs/doc-8218" }, { "trust": 1.8, "url": "https://service.sap.com/sap/support/notes/1986895" }, { "trust": 1.2, "url": "http://www.securityfocus.com/archive/1/531854/100/0/threaded" }, { "trust": 1.2, "url": "http://www.exploit-db.com/exploits/32919" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0984" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0984" }, { "trust": 0.6, "url": "http://secunia.com/advisories/57993/" }, { "trust": 0.6, "url": "http://osvdb.com/show/osvdb/105967" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/531854/100/0/threaded" }, { "trust": 0.6, "url": "http://secunia.com/advisories/57993" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=33846" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/32919/" }, { "trust": 0.1, "url": "https://github.com/martingalloar/martingalloar" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "VULHUB", "id": "VHN-68477" }, { "db": "VULMON", "id": "CVE-2014-0984" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "NVD", "id": "CVE-2014-0984" }, { "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" }, { "db": "VULHUB", "id": "VHN-68477" }, { "db": "VULMON", "id": "CVE-2014-0984" }, { "db": "BID", "id": "66938" }, { "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "db": "NVD", "id": "CVE-2014-0984" }, { "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-21T00:00:00", "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "date": "2014-04-21T00:00:00", "db": "CNVD", "id": "CNVD-2014-02529" }, { "date": "2014-04-17T00:00:00", "db": "VULHUB", "id": "VHN-68477" }, { "date": "2014-04-17T00:00:00", "db": "VULMON", "id": "CVE-2014-0984" }, { "date": "2014-04-16T00:00:00", "db": "BID", "id": "66938" }, { "date": "2014-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "date": "2014-04-17T14:55:08.857000", "db": "NVD", "id": "CVE-2014-0984" }, { "date": "2014-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-21T00:00:00", "db": "CNVD", "id": "CNVD-2014-02529" }, { "date": "2018-10-10T00:00:00", "db": "VULHUB", "id": "VHN-68477" }, { "date": "2018-10-10T00:00:00", "db": "VULMON", "id": "CVE-2014-0984" }, { "date": "2014-04-16T00:00:00", "db": "BID", "id": "66938" }, { "date": "2014-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002173" }, { "date": "2018-10-10T21:29:00.337000", "db": "NVD", "id": "CVE-2014-0984" }, { "date": "2014-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-362" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-362" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAProuter Information Disclosure Vulnerability", "sources": [ { "db": "IVD", "id": "7593d75a-1edc-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-02529" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-362" } ], "trust": 0.6 } }
var-202206-1219
Vulnerability from variot
Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability. SAP NetWeaver AS ABAP , netweaver as abap krnl64nuc , netweaver as abap krnl64uc etc. multiple SAP The product contains an incorrect authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1219", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.88" }, { "model": "netweaver as abap krnl64uc", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.49" }, { "model": "router", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.53" }, { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.49" }, { "model": "router", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.22" }, { "model": "netweaver as abap krnl64nuc", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.49" }, { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.87" }, { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.81" }, { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.86" }, { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.77" }, { "model": "netweaver as abap", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "kernel_7.85" }, { "model": "netweaver as abap krnl64uc", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "netweaver as abap", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "netweaver as abap krnl64nuc", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "router", "scope": null, "trust": 0.8, "vendor": "sap", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "NVD", "id": "CVE-2022-27668" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.77:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap_krnl64uc:7.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:router:7.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:router:7.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.87:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.88:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-27668" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fabian Hagg", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1322" } ], "trust": 0.6 }, "cve": "CVE-2022-27668", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-27668", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-418337", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-27668", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-27668", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202206-1322", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-418337", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-27668", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418337" }, { "db": "VULMON", "id": "CVE-2022-27668" }, { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "NVD", "id": "CVE-2022-27668" }, { "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Depending on the configuration of the route permission table in file \u0027saprouttab\u0027, it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability. SAP NetWeaver AS ABAP , netweaver as abap krnl64nuc , netweaver as abap krnl64uc etc. multiple SAP The product contains an incorrect authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-27668" }, { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "VULHUB", "id": "VHN-418337" }, { "db": "VULMON", "id": "CVE-2022-27668" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-418337", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418337" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27668", "trust": 3.4 }, { "db": "PACKETSTORM", "id": "168406", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2022-011898", "trust": 0.8 }, { "db": "CXSECURITY", "id": "WLB-2022090043", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202206-1322", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418337", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-27668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418337" }, { "db": "VULMON", "id": "CVE-2022-27668" }, { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "NVD", "id": "CVE-2022-27668" }, { "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "id": "VAR-202206-1219", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418337" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:41.345000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP NetWeaver and ABAP Platform Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198110" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-863", "trust": 1.1 }, { "problemtype": "Illegal authentication (CWE-863) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418337" }, { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "NVD", "id": "CVE-2022-27668" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://packetstormsecurity.com/files/168406/sap-saprouter-improper-access-control.html" }, { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2022/sep/17" }, { "trust": 2.6, "url": "https://launchpad.support.sap.com/#/notes/3158375" }, { "trust": 2.6, "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27668" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/sap-multiple-vulnerabilities-de-decembre-2021-38592" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27668/" }, { "trust": 0.6, "url": "https://cxsecurity.com/issue/wlb-2022090043" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418337" }, { "db": "VULMON", "id": "CVE-2022-27668" }, { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "NVD", "id": "CVE-2022-27668" }, { "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418337" }, { "db": "VULMON", "id": "CVE-2022-27668" }, { "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "db": "NVD", "id": "CVE-2022-27668" }, { "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-14T00:00:00", "db": "VULHUB", "id": "VHN-418337" }, { "date": "2022-06-14T00:00:00", "db": "VULMON", "id": "CVE-2022-27668" }, { "date": "2023-08-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "date": "2022-06-14T17:15:08.177000", "db": "NVD", "id": "CVE-2022-27668" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-418337" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-27668" }, { "date": "2023-08-24T08:26:00", "db": "JVNDB", "id": "JVNDB-2022-011898" }, { "date": "2022-10-27T19:11:06.227000", "db": "NVD", "id": "CVE-2022-27668" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1322" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1322" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0SAP\u00a0 Fraudulent Authentication Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011898" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1322" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:router:710:029:*:*:*:*:*:*", "matchCriteriaId": "4B4FF6BF-F2F0-4893-B5A1-2E55D56BA80D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:router:720:411:*:*:*:*:*:*", "matchCriteriaId": "62B0C1B5-600E-4469-8837-F475E83F1F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:router:721:117:*:*:*:*:*:*", "matchCriteriaId": "DAA327C6-4FE3-4BE1-A0D4-1035201AC2FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack." }, { "lang": "es", "value": "La funci\u00f3n passwordCheck en SAP Router 721 patch 117, 720 patch 411, 710 patch 029, y anteriores termina la validaci\u00f3n de una contrase\u00f1a de entrada Route Permission Table al encontrarse con el primer car\u00e1cter incorrecto. Esto permite que los atacantes remotos obtengan contrase\u00f1as mediante un ataque de fuerza bruta que depende de diferencias en la sincronizaci\u00f3n en las respuestas a adivinaciones incorrectas de contrase\u00f1a. Esto tambi\u00e9n se conoce como ataque de sincronizaci\u00f3n de canal lateral." } ], "id": "CVE-2014-0984", "lastModified": "2024-11-21T02:03:09.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-17T14:55:08.857", "references": [ { "source": "cve@mitre.org", "url": "http://scn.sap.com/docs/DOC-8218" }, { "source": "cve@mitre.org", "url": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/32919" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531854/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://service.sap.com/sap/support/notes/1986895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://scn.sap.com/docs/DOC-8218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/32919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531854/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://service.sap.com/sap/support/notes/1986895" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html | Exploit, Third Party Advisory | |
cna@sap.com | http://seclists.org/fulldisclosure/2022/Sep/17 | Exploit, Mailing List, Third Party Advisory | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/3158375 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2022/Sep/17 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/3158375 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
sap | netweaver_as_abap | kernel_7.49 | |
sap | netweaver_as_abap | kernel_7.77 | |
sap | netweaver_as_abap | kernel_7.81 | |
sap | netweaver_as_abap | kernel_7.85 | |
sap | netweaver_as_abap | kernel_7.86 | |
sap | netweaver_as_abap | kernel_7.87 | |
sap | netweaver_as_abap | kernel_7.88 | |
sap | netweaver_as_abap_krnl64nuc | 7.49 | |
sap | netweaver_as_abap_krnl64uc | 7.49 | |
sap | router | 7.22 | |
sap | router | 7.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.49:*:*:*:*:*:*:*", "matchCriteriaId": "D25E4DE4-8031-4396-A0CD-30FE83B5260B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.77:*:*:*:*:*:*:*", "matchCriteriaId": "48D2700C-45F0-4041-AE69-3D4E4FE8186F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.81:*:*:*:*:*:*:*", "matchCriteriaId": "C0F1DD71-9507-48BF-B58F-81EB7A233021", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.85:*:*:*:*:*:*:*", "matchCriteriaId": "BFE477E5-217A-4B4A-98AF-03444E7DCC92", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.86:*:*:*:*:*:*:*", "matchCriteriaId": "A43BB781-7C60-43B8-A59C-3854514DB445", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.87:*:*:*:*:*:*:*", "matchCriteriaId": "8042BA64-A5C6-4E86-8705-3705B9D1F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.88:*:*:*:*:*:*:*", "matchCriteriaId": "D304B534-EACC-40E8-8AA5-683E8E63A321", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap_krnl64nuc:7.49:*:*:*:*:*:*:*", "matchCriteriaId": "1FEEB006-D93C-4E37-82B3-4B97373FC154", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver_as_abap_krnl64uc:7.49:*:*:*:*:*:*:*", "matchCriteriaId": "5F1FEA71-D53B-4520-AE06-60D337ACA177", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:router:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "0614F3CF-CCF2-42E5-89A8-779E8B0D11F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:router:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "86186BB9-EC4E-4ABA-9858-37560D85C612", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Depending on the configuration of the route permission table in file \u0027saprouttab\u0027, it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability." }, { "lang": "es", "value": "Dependiendo de la configuraci\u00f3n de la tabla de permisos de ruta en el archivo \"saprouttab\", es posible que un atacante no autenticado ejecute comandos de administraci\u00f3n de SAProuter en SAP NetWeaver y ABAP Platform - versiones KERNEL 7. 49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, desde un cliente remoto, por ejemplo deteniendo el SAProuter, lo que podr\u00eda tener un gran impacto en la disponibilidad de los sistemas" } ], "id": "CVE-2022-27668", "lastModified": "2024-11-21T06:56:08.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-14T17:15:08.177", "references": [ { "source": "cna@sap.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html" }, { "source": "cna@sap.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Sep/17" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3158375" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Sep/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3158375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "cna@sap.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
cve-2022-27668
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | x_refsource_MISC | |
https://launchpad.support.sap.com/#/notes/3158375 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2022/Sep/17 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP SE | SAP NetWeaver and ABAP Platform |
Version: KERNEL 7.49 Version: 7.77 Version: 7.81 Version: 7.85 Version: 7.86 Version: 7.87 Version: 7.88 Version: KRNL64NUC 7.49 Version: KRNL64UC 7.49 Version: SAP_ROUTER 7.53 Version: 7.22 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:33:00.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3158375" }, { "name": "20220915 SEC Consult SA-20220914-0 :: Improper Access Control in SAP SAProuter", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Sep/17" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP NetWeaver and ABAP Platform", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "KERNEL 7.49" }, { "status": "affected", "version": "7.77" }, { "status": "affected", "version": "7.81" }, { "status": "affected", "version": "7.85" }, { "status": "affected", "version": "7.86" }, { "status": "affected", "version": "7.87" }, { "status": "affected", "version": "7.88" }, { "status": "affected", "version": "KRNL64NUC 7.49" }, { "status": "affected", "version": "KRNL64UC 7.49" }, { "status": "affected", "version": "SAP_ROUTER 7.53" }, { "status": "affected", "version": "7.22" } ] } ], "descriptions": [ { "lang": "en", "value": "Depending on the configuration of the route permission table in file \u0027saprouttab\u0027, it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T15:06:17", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3158375" }, { "name": "20220915 SEC Consult SA-20220914-0 :: Improper Access Control in SAP SAProuter", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/Sep/17" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2022-27668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP NetWeaver and ABAP Platform", "version": { "version_data": [ { "version_affected": "=", "version_value": "KERNEL 7.49" }, { "version_affected": "=", "version_value": "7.77" }, { "version_affected": "=", "version_value": "7.81" }, { "version_affected": "=", "version_value": "7.85" }, { "version_affected": "=", "version_value": "7.86" }, { "version_affected": "=", "version_value": "7.87" }, { "version_affected": "=", "version_value": "7.88" }, { "version_affected": "=", "version_value": "KRNL64NUC 7.49" }, { "version_affected": "=", "version_value": "KRNL64UC 7.49" }, { "version_affected": "=", "version_value": "SAP_ROUTER 7.53" }, { "version_affected": "=", "version_value": "7.22" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Depending on the configuration of the route permission table in file \u0027saprouttab\u0027, it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability." } ] }, "impact": { "cvss": { "baseScore": "null", "vectorString": "null", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "refsource": "MISC", "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "name": "https://launchpad.support.sap.com/#/notes/3158375", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3158375" }, { "name": "20220915 SEC Consult SA-20220914-0 :: Improper Access Control in SAP SAProuter", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Sep/17" }, { "name": "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2022-27668", "datePublished": "2022-06-14T16:57:29", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-08-03T05:33:00.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0984
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://service.sap.com/sap/support/notes/1986895 | x_refsource_CONFIRM | |
http://www.coresecurity.com/advisories/sap-router-password-timing-attack | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/531854/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.exploit-db.com/exploits/32919 | exploit, x_refsource_EXPLOIT-DB | |
http://scn.sap.com/docs/DOC-8218 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:34:40.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/1986895" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack" }, { "name": "20140416 [CORE-2014-0003] - SAP Router Password Timing Attack", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531854/100/0/threaded" }, { "name": "32919", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/32919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://scn.sap.com/docs/DOC-8218" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://service.sap.com/sap/support/notes/1986895" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack" }, { "name": "20140416 [CORE-2014-0003] - SAP Router Password Timing Attack", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531854/100/0/threaded" }, { "name": "32919", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/32919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://scn.sap.com/docs/DOC-8218" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-0984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The passwordCheck function in SAP Router 721 patch 117, 720 patch 411, 710 patch 029, and earlier terminates validation of a Route Permission Table entry password upon encountering the first incorrect character, which allows remote attackers to obtain passwords via a brute-force attack that relies on timing differences in responses to incorrect password guesses, aka a timing side-channel attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.sap.com/sap/support/notes/1986895", "refsource": "CONFIRM", "url": "https://service.sap.com/sap/support/notes/1986895" }, { "name": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack", "refsource": "MISC", "url": "http://www.coresecurity.com/advisories/sap-router-password-timing-attack" }, { "name": "20140416 [CORE-2014-0003] - SAP Router Password Timing Attack", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531854/100/0/threaded" }, { "name": "32919", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/32919" }, { "name": "http://scn.sap.com/docs/DOC-8218", "refsource": "CONFIRM", "url": "http://scn.sap.com/docs/DOC-8218" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-0984", "datePublished": "2014-04-17T14:00:00", "dateReserved": "2014-01-07T00:00:00", "dateUpdated": "2024-08-06T09:34:40.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }