First published: Wed Dec 09 2020(Updated: )
SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server Java | =7.11 | |
SAP NetWeaver Application Server Java | =7.20 | |
SAP NetWeaver Application Server Java | =7.30 | |
SAP NetWeaver Application Server Java | =7.31 | |
SAP NetWeaver Application Server Java | =7.40 | |
SAP NetWeaver Application Server Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-26829.
The severity of CVE-2020-26829 is critical.
The versions 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 of SAP NetWeaver AS JAVA are affected by CVE-2020-26829.
CVE-2020-26829 allows arbitrary connections from processes outside the cluster and network segment, bypassing authentication checks.
Yes, here are some references: [Packet Storm Security](http://packetstormsecurity.com/files/163166/SAP-Netweaver-JAVA-7.50-Missing-Authorization.html), [SecLists](http://seclists.org/fulldisclosure/2021/Jun/33), [SAP Support](https://launchpad.support.sap.com/#/notes/2974774).