← Back to CVEs
CVE-2021-44235
MEDIUM6.7
Description
Two methods of a utility class in SAP NetWeaver AS ABAP - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allow an attacker with high privileges and has direct access to SAP System, to inject code when executing with a certain transaction class builder. This could allow execution of arbitrary commands on the operating system, that could highly impact the Confidentiality, Integrity and Availability of the system.
CVE Details
CVSS v3.1 Score6.7
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published12/14/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
sap:netweaver_application_server_abap
Weaknesses (CWE)
CWE-78
References
https://launchpad.support.sap.com/#/notes/3123196(cna@sap.com)
https://launchpad.support.sap.com/#/notes/3123196(af854a3a-2127-422b-91ae-364da2661108)
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.