CVE-2023-40308
high-risk
Published 2023-09-12
SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Commoncryptolib
Extended Application Services And Runtime
Hana Database
Host Agent
Affected Vendors
References (4)
Permissions Required
https://me.sap.com/notes/3327896
Permissions Required
https://me.sap.com/notes/3327896
52
/ 100
high-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
25/34 · High