9.8

CVE-2023-0014

SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system.


Data is provided by the National Vulnerability Database (NVD)
SAPNetweaver Application Server Abap Version700 SwEditionsap_basis
SAPNetweaver Application Server Abap Version701 SwEditionsap_basis
SAPNetweaver Application Server Abap Version702 SwEditionsap_basis
SAPNetweaver Application Server Abap Version710 SwEditionsap_basis
SAPNetweaver Application Server Abap Version711 SwEditionsap_basis
SAPNetweaver Application Server Abap Version730 SwEditionsap_basis
SAPNetweaver Application Server Abap Version731 SwEditionsap_basis
SAPNetweaver Application Server Abap Version740 SwEditionsap_basis
SAPNetweaver Application Server Abap Version750 SwEditionsap_basis
SAPNetweaver Application Server Abap Version751 SwEditionsap_basis
SAPNetweaver Application Server Abap Version752 SwEditionsap_basis
SAPNetweaver Application Server Abap Version753 SwEditionsap_basis
SAPNetweaver Application Server Abap Version754 SwEditionsap_basis
SAPNetweaver Application Server Abap Version755 SwEditionsap_basis
SAPNetweaver Application Server Abap Version756 SwEditionsap_basis
SAPNetweaver Application Server Abap Version757 SwEditionsap_basis
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.39% 0.591
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cna@sap.com 9 2.2 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-294 Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).