Vulnerability Details : CVE-2023-23857
Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and services across systems. On a successful exploitation, the attacker can read and modify some sensitive information but can also be used to lock up any element or operation of the system making that it unresponsive or unavailable.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-23857
- cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23857
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23857
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H |
3.9
|
5.3
|
SAP SE | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H |
3.9
|
4.7
|
NIST |
CWE ids for CVE-2023-23857
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: cna@sap.com (Primary)
References for CVE-2023-23857
-
https://launchpad.support.sap.com/#/notes/3252433
SAP ONE Support Launchpad: Log OnPermissions Required
-
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
SAP Patch Day BlogVendor Advisory
Jump to