First published: Tue Dec 13 2022(Updated: )
An unauthenticated user can attach to an open interface exposed through JNDI by the Messaging System of SAP NetWeaver Process Integration (PI) - version 7.50. This user can make use of an open naming and directory API to access services that could perform unauthorized operations. The vulnerability affects local users and data, leading to a considerable impact on confidentiality as well as availability and a limited impact on the integrity of the application. These operations can be used to: * Read any information * Modify sensitive information * Denial of Service attacks (DoS) * SQL Injection
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Process Integration | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-41271 is critical with a CVSS score of 9.4.
CVE-2022-41271 affects SAP NetWeaver Process Integration version 7.50.
An unauthenticated attacker can exploit CVE-2022-41271 by attaching to an open interface exposed through JNDI and accessing unauthorized services.
CVE-2022-41271 has CWE IDs 89, 862, and 306.
To fix CVE-2022-41271, SAP recommends applying the relevant SAP Security Note or patch provided by SAP.