Overview
- Description
- A remote code execution vulnerability exists in the SAP NetWeaver UDDI Server (Services Registry), versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50. Because of this, an attacker can exploit Services Registry potentially enabling them to take complete control of the product, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the product to terminate.
- Source
- cna@sap.com
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:netweaver:7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFFDB95-B956-4B22-81F4-A4074D49D4A8" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53B11A3B-C559-428C-8946-7FD9FFBFA1BC" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "606EFE4F-57A4-44E2-A98D-F0867A658218" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FECD5E96-7669-4747-80D2-27F95BF420BC" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F019F7F5-7740-4BD4-850F-D7A1923C6200" }, { "criteria": "cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2B37045-2FB7-49BB-AE38-B84FAA6ADFB0" } ], "operator": "OR" } ] } ]