First published: Wed Jun 09 2021(Updated: )
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CiXMLIStreamRawBuffer::readRaw () which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Internet Graphics Server | =7.20 | |
SAP Internet Graphics Server | =7.20ex2 | |
SAP Internet Graphics Server | =7.20ext | |
SAP Internet Graphics Server | =7.53 | |
SAP Internet Graphics Server | =7.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27624 has been classified as a critical vulnerability due to the ease of exploitation and potential impact on security.
To remediate CVE-2021-27624, it is recommended to apply the latest security patches provided by SAP for the affected version.
CVE-2021-27624 impacts SAP Internet Graphics Service versions 7.20, 7.20EXT, 7.53, 7.20_EX2, and 7.81.
Yes, an unauthenticated attacker can exploit CVE-2021-27624 remotely by sending a malicious IGS request over the network.
CVE-2021-27624 is an input validation vulnerability that allows attackers to submit malicious requests due to insufficient validation.