8.2
CVE-2025-42878
- EPSS 0.06%
- Veröffentlicht 09.12.2025 02:14:59
- Zuletzt bearbeitet 09.12.2025 18:36:53
- Quelle cna@sap.com
- CVE-Watchlists
- Unerledigt
SAP Web Dispatcher and ICM may expose internal testing interfaces that are not intended for production. If enabled, unauthenticated attackers could exploit them to access diagnostics, send crafted requests, or disrupt services. This vulnerability has a high impact on confidentiality, availability and low impact on integrity and of the application.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSAP_SE
≫
Produkt
SAP Web Dispatcher and Internet Communication Manager (ICM)
Default Statusunaffected
Version
KRNL64NUC 7.22
Status
affected
Version
7.22EXT
Status
affected
Version
KRNL64UC 7.22
Status
affected
Version
7.53
Status
affected
Version
WEBDISP 7.22_EXT
Status
affected
Version
7.54
Status
affected
Version
7.77
Status
affected
Version
7.89
Status
affected
Version
7.93
Status
affected
Version
9.16
Status
affected
Version
KERNEL 7.22
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.176 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cna@sap.com | 8.2 | 1.6 | 6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:H
|
CWE-1244 Internal Asset Exposed to Unsafe Debug Access Level or State
The product uses physical debug or test interfaces with support for multiple access levels, but it assigns the wrong debug access level to an internal asset, providing unintended access to the asset from untrusted debug agents.