7.2
CVE-2021-44235
- EPSS 0.12%
- Published 14.12.2021 16:15:09
- Last modified 21.11.2024 06:30:39
- Source cna@sap.com
- Teams watchlist Login
- Open Login
Two methods of a utility class in SAP NetWeaver AS ABAP - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allow an attacker with high privileges and has direct access to SAP System, to inject code when executing with a certain transaction class builder. This could allow execution of arbitrary commands on the operating system, that could highly impact the Confidentiality, Integrity and Availability of the system.
Data is provided by the National Vulnerability Database (NVD)
SAP ≫ Netweaver Application Server Abap Version700
SAP ≫ Netweaver Application Server Abap Version701
SAP ≫ Netweaver Application Server Abap Version702
SAP ≫ Netweaver Application Server Abap Version710
SAP ≫ Netweaver Application Server Abap Version711
SAP ≫ Netweaver Application Server Abap Version730
SAP ≫ Netweaver Application Server Abap Version731
SAP ≫ Netweaver Application Server Abap Version740
SAP ≫ Netweaver Application Server Abap Version750
SAP ≫ Netweaver Application Server Abap Version751
SAP ≫ Netweaver Application Server Abap Version752
SAP ≫ Netweaver Application Server Abap Version753
SAP ≫ Netweaver Application Server Abap Version754
SAP ≫ Netweaver Application Server Abap Version755
SAP ≫ Netweaver Application Server Abap Version756
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.12% | 0.277 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.