sap netweaver-abap CVE-2022-22543 vulnerability in SAP Products
Published on February 9, 2022

SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected.

NVD

Weakness Type

What is a Resource Exhaustion Vulnerability?

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2022-22543 has been classified to as a Resource Exhaustion vulnerability or weakness.


Products Associated with CVE-2022-22543

stack.watch emails you whenever new vulnerabilities are published in SAP Netweaver Abap or SAP Netweaver As Abap. Just hit a watch button to start following.

 
 

Affected Versions

SAP SE SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel):

Exploit Probability

EPSS
0.58%
Percentile
68.43%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.