First published: Tue Jul 10 2018(Updated: )
SAP Gateway (SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49 and 7.53) allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Kernel | =7.21 | |
SAP Kernel | =7.21ext | |
SAP Kernel | =7.22 | |
SAP Kernel | =7.22ext | |
SAP Kernel | =7.45 | |
SAP Kernel | =7.49 | |
SAP Kernel | =7.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2433 is rated as a high severity vulnerability due to its potential to disrupt service availability.
To remediate CVE-2018-2433, you should apply the latest patches provided by SAP for the affected kernel versions.
CVE-2018-2433 affects various SAP kernel versions including 7.21, 7.22, 7.45, 7.49, and 7.53.
CVE-2018-2433 can be exploited through denial-of-service attacks that crash or flood services, preventing legitimate user access.
While the primary solution is to apply patches, reducing service exposure or implementing rate limiting may serve as temporary workarounds for CVE-2018-2433.