CVE-2017-16689
moderate-risk
Published 2017-12-12
A Trusted RFC connection in SAP KERNEL 32NUC, SAP KERNEL 32Unicode, SAP KERNEL 64NUC, SAP KERNEL 64Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49, can be established to a different client or a different user on the same system, although no explicit Trusted/Trusting Relation to the same system has been defined.
Do I need to act?
-
0.33% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (6)
Sap Kernel
Sap Kernel
Sap Kernel
Sap Kernel
Sap Kernel
Sap Kernel
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/102144
Permissions Required
https://launchpad.support.sap.com/#/notes/2449757
Third Party Advisory
http://www.securityfocus.com/bid/102144
Permissions Required
https://launchpad.support.sap.com/#/notes/2449757
44
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
1/34 · Minimal
Exposure
13/34 · Low