First published: Wed Jun 09 2021(Updated: )
SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method ThCpicDtCreate () causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver ABAP | =kernel_7.22 | |
SAP NetWeaver ABAP | =kernel_7.49 | |
SAP NetWeaver ABAP | =kernel_7.53 | |
SAP NetWeaver ABAP | =kernel_7.73 | |
SAP NetWeaver ABAP | =kernel_8.04 | |
SAP NetWeaver ABAP | =krnl32nuc_7.22 | |
SAP NetWeaver ABAP | =krnl32nuc_7.22ext | |
SAP NetWeaver ABAP | =krnl64nuc_7.22 | |
SAP NetWeaver ABAP | =krnl64nuc_7.22ext | |
SAP NetWeaver ABAP | =krnl64nuc_7.49 | |
SAP NetWeaver ABAP | =krnl64uc_7.22 | |
SAP NetWeaver ABAP | =krnl64uc_7.22ext | |
SAP NetWeaver ABAP | =krnl64uc_7.49 | |
SAP NetWeaver ABAP | =krnl64uc_7.53 | |
SAP NetWeaver ABAP | =krnl64uc_7.73 | |
SAP NetWeaver ABAP | =krnl64uc_8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27634 is high.
The affected software for CVE-2021-27634 is SAP NetWeaver AS for ABAP (RFC Gateway) versions KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83.
An unauthenticated attacker can exploit CVE-2021-27634 by sending a specific request to the system.
Yes, please refer to the SAP notes and documentation for the available fixes for CVE-2021-27634.
The CWE ID for CVE-2021-27634 is 20 and 787.