First published: Tue Apr 13 2021(Updated: )
An unauthorized attacker may be able to entice an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java that allow the attacker to gain NTLM hashes of a privileged user.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server Java | =7.10 | |
SAP NetWeaver Application Server Java | =7.20 | |
SAP NetWeaver Application Server Java | =7.30 | |
SAP NetWeaver Application Server Java | =7.31 | |
SAP NetWeaver Application Server Java | =7.40 | |
SAP NetWeaver Application Server Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21485 is a vulnerability that allows an attacker to gain NTLM hashes of a privileged user by enticing an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java.
CVE-2021-21485 has a severity rating of 6.5 (high).
SAP NetWeaver Application Server Java versions 7.10, 7.20, 7.30, 7.31, 7.40, and 7.50 are affected by CVE-2021-21485.
An unauthorized attacker can exploit CVE-2021-21485 by enticing an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java.
You can find more information about CVE-2021-21485 on the SAP Support Portal (https://launchpad.support.sap.com/#/notes/3001824) and the SAP Community Wiki (https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649).