CVE-2010-5326
high-risk
Published 2016-05-13
The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack.
Do I need to act?
!
16.9% chance of exploitation in next 30 days
EPSS score — higher than 83% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (13)
Permissions Required
http://service.sap.com/sap/support/notes/1445998
Third Party Advisory
http://www.securityfocus.com/bid/48925
Third Party Advisory
http://www.securityfocus.com/bid/90533
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA16-132A
Third Party Advisory
https://www.onapsis.com/threat-report-tip-iceberg-wild-exploitation-cyber-attack...
Permissions Required
http://service.sap.com/sap/support/notes/1445998
Third Party Advisory
http://www.securityfocus.com/bid/48925
Third Party Advisory
http://www.securityfocus.com/bid/90533
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA16-132A
Third Party Advisory
https://www.onapsis.com/threat-report-tip-iceberg-wild-exploitation-cyber-attack...
58
/ 100
high-risk
Severity
33/34 · Critical
Exploitability
20/34 · Moderate
Exposure
5/34 · Minimal