First published: Wed Aug 14 2019(Updated: )
A remote code execution vulnerability exists in the SAP NetWeaver UDDI Server (Services Registry), versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50. Because of this, an attacker can exploit Services Registry potentially enabling them to take complete control of the product, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the product to terminate.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | =7.10 | |
SAP NetWeaver | =7.20 | |
SAP NetWeaver | =7.30 | |
SAP NetWeaver | =7.31 | |
SAP NetWeaver | =7.40 | |
SAP NetWeaver | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0351 is a remote code execution vulnerability in the SAP NetWeaver UDDI Server (Services Registry), affecting versions 7.10 to 7.50.
CVE-2019-0351 has a severity rating of 8.8, indicating a high risk.
Versions 7.10, 7.20, 7.30, 7.31, 7.40, and 7.50 of the SAP NetWeaver UDDI Server (Services Registry) are affected by CVE-2019-0351.
By exploiting CVE-2019-0351, an attacker can potentially gain complete control of the SAP NetWeaver UDDI Server, allowing them to view, change, and take control of the product.
To mitigate CVE-2019-0351, apply the necessary patches provided by SAP and update your SAP NetWeaver UDDI Server software to a version that is not affected by the vulnerability.