First published: Tue Aug 14 2018(Updated: )
Under certain conditions the SAP Change and Transport System (ABAP), SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49, 7.53 and 7.73, allows an attacker to transport information which would otherwise be restricted.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Kernel | =7.21 | |
SAP Kernel | =7.21ext | |
SAP Kernel | =7.22 | |
SAP Kernel | =7.22ext | |
SAP Kernel | =7.45 | |
SAP Kernel | =7.49 | |
SAP Kernel | =7.53 | |
SAP Kernel | =7.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2441 has a medium severity rating due to the potential for unauthorized information transport.
To fix CVE-2018-2441, update your SAP Kernel to a version that has addressed the vulnerability.
CVE-2018-2441 affects SAP Kernel versions 7.21, 7.21ext, 7.22, 7.22ext, 7.45, 7.49, 7.53, and 7.73.
The impact of CVE-2018-2441 allows attackers to transport sensitive information that would normally be restricted.
Yes, there are known exploitation scenarios for CVE-2018-2441 that can lead to unauthorized information access.