CVE-2022-28773 vulnerability in SAP Products
Published on April 12, 2022
Due to an uncontrolled recursion in SAP Web Dispatcher and SAP Internet Communication Manager, the application may crash, leading to denial of service, but can be restarted automatically.
Weakness Type
What is a Stack Exhaustion Vulnerability?
The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
CVE-2022-28773 has been classified to as a Stack Exhaustion vulnerability or weakness.
Products Associated with CVE-2022-28773
stack.watch emails you whenever new vulnerabilities are published in SAP NetWeaver or SAP Web Dispatcher. Just hit a watch button to start following.
Affected Versions
SAP SE SAP NetWeaver (Internet Communication Manager):- Version KRNL64NUC 7.22 is affected.
- Version 7.22EXT is affected.
- Version 7.49 is affected.
- Version KRNL64UC 7.22 is affected.
- Version 7.53 is affected.
- Version KERNEL 7.22 is affected.
- Version 7.77 is affected.
- Version 7.81 is affected.
- Version 7.85 is affected.
- Version 7.86 is affected.
- Version 7.53 is affected.
- Version 7.77 is affected.
- Version 7.81 is affected.
- Version 7.85 is affected.
- Version 7.86 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.