First published: Tue Nov 08 2022(Updated: )
Due to insufficient input validation, SAP NetWeaver Application Server ABAP and ABAP Platform allows an attacker with high level privileges to use a remote enabled function to delete a file which is otherwise restricted. On successful exploitation an attacker can completely compromise the integrity and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =700 | |
SAP NetWeaver Application Server ABAP | =731 | |
SAP NetWeaver Application Server ABAP | =740 | |
SAP NetWeaver Application Server ABAP | =750 | |
SAP NetWeaver Application Server ABAP | =789 | |
SAP NetWeaver Application Server ABAP | =804 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this SAP NetWeaver Application Server ABAP vulnerability is CVE-2022-41214.
The severity level of CVE-2022-41214 is high.
The affected versions of SAP NetWeaver Application Server ABAP are 700, 731, 740, 750, 789, and 804.
Successful exploitation of CVE-2022-41214 can completely compromise the integrity of the system.
You can find more information about CVE-2022-41214 in the SAP Knowledge Base Article (SAP Note) 3256571 and the SAP security advisory.