First published: Tue Mar 14 2023(Updated: )
Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and services across systems. On a successful exploitation, the attacker can read and modify some sensitive information but can also be used to lock up any element or operation of the system making that it unresponsive or unavailable.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server for Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-23857 is critical.
CVE-2023-23857 allows an unauthenticated attacker to access services and perform unauthorized operations affecting users and services across SAP NetWeaver AS for Java.
An attacker can exploit CVE-2023-23857 by attaching to an open interface and using an open naming and directory API to access services and perform unauthorized operations.
Yes, SAP has released patches to address the vulnerability. Please refer to the SAP security note or the SAP website for the appropriate patch.
You can find more information about CVE-2023-23857 in the SAP support note or the SAP website provided in the references section.