First published: Tue Mar 14 2023(Updated: )
SAP NetWeaver AS Java (Object Analyzing Service) - version 7.50, does not perform necessary authorization checks, allowing an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability., resulting in escalation of privileges.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS JAVA | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-27268 is medium with a severity value of 5.3.
CVE-2023-27268 is a vulnerability in SAP NetWeaver AS Java (Object Analyzing Service) version 7.50 that allows an unauthenticated attacker to access a service and potentially gain unauthorized access.
SAP NetWeaver Application Server for Java version 7.50 is affected by CVE-2023-27268.
An attacker can exploit CVE-2023-27268 by attaching to an open interface and using an open naming and directory API to access a service, potentially gaining unauthorized access.
It is recommended to apply the necessary security patches and updates provided by SAP to address CVE-2023-27268. Please refer to the SAP notes for more information.