Vulnerability Details : CVE-2021-44235
Two methods of a utility class in SAP NetWeaver AS ABAP - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allow an attacker with high privileges and has direct access to SAP System, to inject code when executing with a certain transaction class builder. This could allow execution of arbitrary commands on the operating system, that could highly impact the Confidentiality, Integrity and Availability of the system.
Products affected by CVE-2021-44235
- cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:730:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:710:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_abap:711:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-44235
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-44235
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST |
CWE ids for CVE-2021-44235
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-44235
-
https://launchpad.support.sap.com/#/notes/3123196
SAP ONE Support Launchpad: Log OnPermissions Required
-
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021
SAP Security Patch Day - December 2021 - Product Security Response at SAP - Community WikiVendor Advisory
Jump to