CVE-2022-22543

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected.
Overview
  • CVE ID
  • CVE-2022-22543
  • Assigner
  • cna@sap.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-02-09T23:15:18
  • Last Modified Date
  • 2022-10-25T20:39:26
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:sap:netweaver_abap:7.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.22ext:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.49:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.53:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.77:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.81:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.85:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.86:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:7.87:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:8.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_8.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.22ext:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.49:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.53:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.77:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.81:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.85:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.86:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:7.87:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:8.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:krnl64nuc_7.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:netweaver_as_abap:krnl64nuc_8.04:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
History
Created Old Value New Value Data Type Notes
2022-05-10 06:31:27 Added to TrackCVE
2022-12-06 09:17:19 2022-02-09T23:15Z 2022-02-09T23:15:18 CVE Published Date updated
2022-12-06 09:17:19 2022-10-25T20:39:26 CVE Modified Date updated
2022-12-06 09:17:19 Analyzed Vulnerability Status updated