SAP NetWeaver ABAP Auth Bypass before 7.93
CVE-2023-35874 Published on July 11, 2023
Improper authentication vulnerability in SAP NetWeaver AS ABAP and ABAP Platform
SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability.
Vulnerability Analysis
CVE-2023-35874 is exploitable with network access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Weakness Type
Missing Authentication for Critical Function
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Products Associated with CVE-2023-35874
Want to know whenever a new CVE is published for SAP Netweaver Application Server Abap? stack.watch will email you.
Affected Versions
SAP_SE SAP NetWeaver AS ABAP and ABAP Platform:- Version KRNL64NUC 722 is affected.
- Version KRNL64NUC 7.22EXT is affected.
- Version KRNL64UC 7.22 is affected.
- Version KRNL64UC 7.22EXT is affected.
- Version KRNL64UC 7.53 is affected.
- Version KERNEL 7.22 is affected.
- Version KERNEL 7.53 is affected.
- Version KERNEL 7.77 is affected.
- Version KERNEL 7.81 is affected.
- Version KERNEL 7.85 is affected.
- Version KERNEL 7.89 is affected.
- Version KERNEL 7.54 is affected.
- Version KERNEL 7.92 is affected.
- Version KERNEL 7.93 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.