First published: Wed Jun 09 2021(Updated: )
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EnqConvUniToSrvReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server for ABAP | =kernel_7.22 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.49 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.53 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.73 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.77 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.81 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.82 | |
SAP NetWeaver Application Server for ABAP | =kernel_7.83 | |
SAP NetWeaver Application Server for ABAP | =kernel_8.04 | |
SAP NetWeaver Application Server for ABAP | =krnl32nuc_7.22 | |
SAP NetWeaver Application Server for ABAP | =krnl32nuc_7.22ext | |
SAP NetWeaver Application Server for ABAP | =krnl64nuc_7.22 | |
SAP NetWeaver Application Server for ABAP | =krnl64nuc_7.22ext | |
SAP NetWeaver Application Server for ABAP | =krnl64nuc_7.49 | |
SAP NetWeaver Application Server for ABAP | =krnl64uc_7.22 | |
SAP NetWeaver Application Server for ABAP | =krnl64uc_7.22ext | |
SAP NetWeaver Application Server for ABAP | =krnl64uc_7.49 | |
SAP NetWeaver Application Server for ABAP | =krnl64uc_7.53 | |
SAP NetWeaver Application Server for ABAP | =krnl64uc_7.73 | |
SAP NetWeaver Application Server for ABAP | =krnl64uc_8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27630 is rated as significant due to its potential for exploitation by unauthenticated attackers.
To remediate CVE-2021-27630, ensure that your SAP NetWeaver ABAP Server is updated to the latest version or apply the recommended patches from SAP.
CVE-2021-27630 affects multiple versions of SAP NetWeaver ABAP Server, including kernel versions 7.22, 7.49, 7.53, 7.73, and 8.04.
The impact of CVE-2021-27630 can lead to unauthorized access and control over the affected SAP systems.
There have been indications that CVE-2021-27630 may be actively exploited in the wild, emphasizing the need for prompt action.