Vulnerability Details : CVE-2021-38177
SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high impact on the availability of the SAP system.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-38177
- cpe:2.3:a:sap:commoncryptolib:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-38177
3.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-38177
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
SAP SE | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2021-38177
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-38177
-
https://launchpad.support.sap.com/#/notes/3051787
SAP ONE Support Launchpad: Log OnPermissions Required
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405
SAP Security Patch Day – September 2021 - Product Security Response at SAP - Community WikiVendor Advisory
-
http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html
SAP CommonCryptoLib Null Pointer Dereference ≈ Packet StormThird Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2022/Jan/74
Full Disclosure: Onapsis Security Advisory 2021-0025: Null Pointer Dereference vulnerability in SAP CommonCryptoLibMailing List;Mitigation;Third Party Advisory
Jump to