CVE-2022-22543 vulnerability in SAP Products
Published on February 9, 2022
SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected.
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2022-22543 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2022-22543
stack.watch emails you whenever new vulnerabilities are published in SAP Netweaver Abap or SAP Netweaver As Abap. Just hit a watch button to start following.
Affected Versions
SAP SE SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel):- Version KERNEL 7.22 is affected.
- Version 8.04 is affected.
- Version 7.49 is affected.
- Version 7.53 is affected.
- Version 7.77 is affected.
- Version 7.81 is affected.
- Version 7.85 is affected.
- Version 7.86 is affected.
- Version 7.87 is affected.
- Version KRNL64UC 8.04 is affected.
- Version 7.22 is affected.
- Version 7.22EXT is affected.
- Version KRNL64NUC 7.22 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.