CVE-2021-33684
moderate-risk
Published 2021-07-14
SAP NetWeaver AS ABAP and ABAP Platform, versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.77, 7.81, 7.84, allows an attacker to send overlong content in the RFC request type thereby crashing the corresponding work process because of memory corruption vulnerability. The work process will attempt to restart itself after the crash and hence the impact on the availability is low.
Do I need to act?
-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Netweaver Abap
Affected Vendors
References (4)
Permissions Required
https://launchpad.support.sap.com/#/notes/3032624
Permissions Required
https://launchpad.support.sap.com/#/notes/3032624
43
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
1/34 · Minimal
Exposure
21/34 · High