CVE-2022-27668
- Reference to the description:
- Description:
- Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability.
- Last updated date:
- 10/27/2022
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/27/2022
- Reference url to background
http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/27/2022
- Reference url to background