First published: Tue Mar 09 2021(Updated: )
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administrative privileges. This could result in complete compromise of system confidentiality, integrity, and availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | =7.10 | |
SAP NetWeaver | =7.11 | |
SAP NetWeaver | =7.20 | |
SAP NetWeaver | =7.30 | |
SAP NetWeaver | =7.31 | |
SAP NetWeaver | =7.40 | |
SAP NetWeaver | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21481 is a vulnerability in the MigrationService component of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50, which allows unauthorized access to configuration objects and potentially granting administrative privileges.
CVE-2021-21481 has a severity rating of 8.8 (critical).
CVE-2021-21481 exposes SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 to unauthorized access and potential administrative privilege escalation.
Yes, SAP has released a security note (3022422) that provides instructions on how to patch the vulnerability and mitigate the risk.
You can find more information about CVE-2021-21481 in the SAP Launchpad Support Portal (note 3022422) and on the SAP Community Network Wiki page.