7.1
CVE-2019-0283
- EPSS 0.13%
- Published 10.04.2019 21:29:01
- Last modified 21.11.2024 04:16:38
- Source cna@sap.com
- Teams watchlist Login
- Open Login
SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document.
Data is provided by the National Vulnerability Database (NVD)
SAP ≫ Netweaver Process Integration Version7.10
SAP ≫ Netweaver Process Integration Version7.11
SAP ≫ Netweaver Process Integration Version7.30
SAP ≫ Netweaver Process Integration Version7.31
SAP ≫ Netweaver Process Integration Version7.40
SAP ≫ Netweaver Process Integration Version7.50
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.13% | 0.286 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.1 | 2.8 | 4.2 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
|
nvd@nist.gov | 5.5 | 8 | 4.9 |
AV:N/AC:L/Au:S/C:P/I:P/A:N
|
CWE-290 Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.