First published: Tue Sep 10 2019(Updated: )
SAP Kernel (RFC), KRNL32NUC, KRNL32UC and KRNL64NUC before versions 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64UC, before versions 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73 and KERNEL before versions 7.21, 7.49, 7.53, 7.73, 7.76 SAP GUI for Windows (BC-FES-GUI) before versions 7.5, 7.6, and SAP GUI for Java (BC-FES-JAV) before version 7.5, allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Kernel | =7.21 | |
SAP Kernel | =7.49 | |
SAP Kernel | =7.53 | |
SAP Kernel | =7.73 | |
SAP Kernel | =7.76 | |
SAP Kernel | =7.21 | |
SAP Kernel | =7.21ext | |
SAP Kernel | =7.22 | |
SAP Kernel | =7.22ext | |
SAP SAP Kernel KRNL32NUC | =7.21 | |
SAP SAP Kernel KRNL32NUC | =7.21ext | |
SAP SAP Kernel KRNL32NUC | =7.22 | |
SAP SAP Kernel KRNL32NUC | =7.22ext | |
SAP Kernel | =7.21 | |
SAP Kernel | =7.21ext | |
SAP Kernel | =7.22 | |
SAP Kernel | =7.22ext | |
SAP Kernel | =7.21 | |
SAP Kernel | =7.21ext | |
SAP Kernel | =7.22 | |
SAP Kernel | =7.22ext | |
SAP Kernel | =7.49 | |
SAP Kernel | =7.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0365 is classified as high severity due to its potential to allow unauthorized access or manipulation of data.
To fix CVE-2019-0365, upgrade to the latest SAP Kernel versions or apply the recommended patches.
CVE-2019-0365 affects SAP Kernel versions prior to 7.21, 7.49, 7.53, 7.73, and 7.76.
Yes, CVE-2019-0365 affects SAP GUI for Windows versions prior to 7.5 and 7.6.
Yes, CVE-2019-0365 can be exploited remotely, allowing attackers to gain unauthorized access.