First published: Tue Jan 10 2023(Updated: )
An unauthenticated attacker in SAP NetWeaver AS for Java - version 7.50, due to improper access control, can attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data on the current system. This could allow the attacker to have full read access to user data, make modifications to user data, and make services within the system unavailable.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server for Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0017 is a vulnerability in SAP NetWeaver AS for Java version 7.50 that allows an unauthenticated attacker to access services and perform unauthorized operations.
The severity of CVE-2023-0017 is critical, with a severity value of 9.8.
CVE-2023-0017 affects SAP NetWeaver AS for Java version 7.50 by allowing an unauthenticated attacker to access services and perform unauthorized operations.
Yes, SAP has released patches and updates to fix CVE-2023-0017. It is recommended to apply the latest security updates provided by SAP.
You can find more information about CVE-2023-0017 on the SAP support portal and in the official SAP documentation.