CVE-2021-27597

HIGH

SAP NetWeaver AS for ABAP - DoS

Title source: llm
STIX 2.1

Description

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method memmove() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.

References (2)

Core 2
Core References
Permissions Required, Vendor Advisory
https://launchpad.support.sap.com/#/notes/3020209

Scores

CVSS v3 7.5
EPSS 0.0028
EPSS Percentile 51.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (16)
sap/netweaver_abap kernel_7.22
sap/netweaver_abap kernel_7.49
sap/netweaver_abap kernel_7.53
sap/netweaver_abap kernel_7.73
sap/netweaver_abap kernel_8.04
sap/netweaver_abap krnl32nuc_7.22
sap/netweaver_abap krnl32nuc_7.22ext
sap/netweaver_abap krnl64nuc_7.22
sap/netweaver_abap krnl64nuc_7.22ext
sap/netweaver_abap krnl64nuc_7.49
... and 6 more
Published Jun 09, 2021
Tracked Since Feb 18, 2026