Vulnerability Details : CVE-2020-26829
SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.
Products affected by CVE-2020-26829
- cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-26829
0.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26829
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:C |
10.0
|
8.5
|
NIST | |
10.0
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
SAP SE | |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST |
CWE ids for CVE-2020-26829
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-26829
-
http://packetstormsecurity.com/files/163166/SAP-Netweaver-JAVA-7.50-Missing-Authorization.html
SAP Netweaver JAVA 7.50 Missing Authorization ≈ Packet StormThird Party Advisory
-
https://launchpad.support.sap.com/#/notes/2974774
Permissions Required;Vendor Advisory
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079
Vendor Advisory
-
http://seclists.org/fulldisclosure/2021/Jun/33
Full Disclosure: Onapsis Security Advisory 2021-0013: [CVE-2020-26829] - Missing Authentication Check In SAP NetWeaver AS JAVA P2P Cluster communicationMailing List;Third Party Advisory
Jump to