SAP MSGSrv ACL Bypass in KERNEL 7.22-7.77 Enables Authenticated Access
CVE-2023-37491 Published on August 8, 2023
Improper Authorization check vulnerability in SAP Message Server
The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
Vulnerability Analysis
CVE-2023-37491 can be exploited with network access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an AuthZ Vulnerability?
The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
CVE-2023-37491 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2023-37491
Want to know whenever a new CVE is published for SAP Message Server? stack.watch will email you.
Affected Versions
SAP_SE SAP Message Server:- Version KERNEL 7.22 is affected.
- Version KERNEL 7.53 is affected.
- Version KERNEL 7.54 is affected.
- Version KERNEL 7.77 is affected.
- Version RNL64UC 7.22 is affected.
- Version RNL64UC 7.22EXT is affected.
- Version RNL64UC 7.53 is affected.
- Version KRNL64NUC 7.22 is affected.
- Version KRNL64NUC 7.22EXT is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.