4.7
CVE-2024-39599
- EPSS 0.03%
- Veröffentlicht 09.07.2024 05:15:12
- Zuletzt bearbeitet 21.11.2024 09:28:05
- Quelle cna@sap.com
- Teams Watchlist Login
- Unerledigt Login
Due to a Protection Mechanism Failure in SAP NetWeaver Application Server for ABAP and ABAP Platform, a developer can bypass the configured malware scanner API because of a programming error. This leads to a low impact on the application's confidentiality, integrity, and availability.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSAP_SE
≫
Produkt
SAP NetWeaver Application Server for ABAP and ABAP Platform
Default Statusunaffected
Version
SAP_BASIS 700
Status
affected
Version
SAP_BASIS 701
Status
affected
Version
SAP_BASIS 702
Status
affected
Version
SAP_BASIS 731
Status
affected
Version
SAP_BASIS 740
Status
affected
Version
SAP_BASIS 750
Status
affected
Version
SAP_BASIS 751
Status
affected
Version
SAP_BASIS 752
Status
affected
Version
SAP_BASIS 753
Status
affected
Version
SAP_BASIS 754
Status
affected
Version
SAP_BASIS 755
Status
affected
Version
SAP_BASIS 756
Status
affected
Version
SAP_BASIS 757
Status
affected
Version
SAP_BASIS 758
Status
affected
Version
SAP_BASIS 795
Status
affected
Version
SAP_BASIS 796
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.051 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
cna@sap.com | 4.7 | 1.2 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
|
CWE-693 Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.