First published: Wed Jun 09 2021(Updated: )
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CMiniXMLParser::Parse() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Internet Graphics Server | =7.20 | |
SAP Internet Graphics Server | =7.20ex2 | |
SAP Internet Graphics Server | =7.20ext | |
SAP Internet Graphics Server | =7.53 | |
SAP Internet Graphics Server | =7.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27626 is classified as a high severity vulnerability due to its potential for unauthenticated remote code execution.
To remediate CVE-2021-27626, you should apply the latest security patches provided by SAP for the affected versions of the Internet Graphics Service.
CVE-2021-27626 affects SAP NetWeaver AS Internet Graphics Server versions 7.20, 7.20ex2, 7.20ext, 7.53, and 7.81.
An attacker can exploit CVE-2021-27626 to perform remote code execution through malicious IGS requests due to insufficient input validation.
Yes, CVE-2021-27626 specifically impacts the SAP Internet Graphics Service within the NetWeaver architecture.