First published: Tue Mar 09 2021(Updated: )
Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker’s code, therefore impacting Availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Knowledge Management | =7.01 | |
SAP NetWeaver Knowledge Management | =7.02 | |
SAP NetWeaver Knowledge Management | =7.30 | |
SAP NetWeaver Knowledge Management | =7.31 | |
SAP NetWeaver Knowledge Management | =7.40 | |
SAP NetWeaver Knowledge Management | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21488 is classified as a medium severity vulnerability that allows insecure deserialization due to insufficient data verification.
To mitigate CVE-2021-21488, it is recommended to apply the latest security patches provided by SAP for the affected versions of SAP NetWeaver Knowledge Management.
CVE-2021-21488 affects SAP NetWeaver Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, and 7.50.
Yes, CVE-2021-21488 could potentially allow remote attackers to execute malicious code, compromising system integrity and availability.
If you are using an affected version of SAP NetWeaver Knowledge Management, prioritize updating your software to the latest secure version.