CVE-2023-37491
CVSS V2 None
CVSS V3 None
Description
The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
Overview
- CVE ID
- CVE-2023-37491
- Assigner
- sap
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-08-08T00:46:40.819Z
- Last Modified Date
- 2023-08-08T00:46:40.819Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://me.sap.com/notes/3344295 | |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-37491 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37491 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 00:32:41 | Added to TrackCVE |