CVE-2020-6304
Published Jan 14, 2020
Last updated 5 years ago
Overview
- Description
- Improper input validation in SAP NetWeaver Internet Communication Manager (update provided in KRNL32NUC & KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT KRNL64NUC & KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49 KERNEL 7.21, 7.49, 7.53) allows an attacker to prevent users from accessing its services through a denial of service.
- Source
- cna@sap.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B557198D-FFA8-48F9-8177-F7ED9987FE56" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC113C9D-0EE4-4D1B-BAEA-6DAB978AA866" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99BD1DB2-C4AB-4B84-91D3-E464FDAF9283" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(kernel\\):7.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0AF7D4B-53AD-410D-9E0F-643ADEF3E87F" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5011C94-80BC-477B-8EB7-3B38D137FB09" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.21ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "693E07D7-77E3-4061-B745-EC7B03EA343D" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "487354B0-CEF2-45BF-9858-BF030D4BAD86" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32nuc\\):7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF766808-846D-44EF-8260-B76235FF746D" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46755D71-2911-481D-94E0-1CC362686B5F" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.21ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD152AEC-38B3-4757-8D2B-AB763F22F9BD" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "417622D6-DCE5-45DC-A0AE-C268D8A50C41" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl32uc\\):7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86405BAF-8A6C-497C-B271-5CF244C075CB" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD69E68D-B0EF-4F03-9541-DAB67F9CA9C7" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.21ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80F7529C-83B6-4D4A-A553-E32260B311BF" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA479004-8ABC-4045-920C-6C459978E633" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A420060-5BB2-4307-8A39-82E3C3211CBC" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64nuc\\):7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E6AF29F-290B-440E-8047-A5D8007B119D" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A15CCCE2-BB24-434B-85DF-EBD1FD2A5715" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.21ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5522AC70-0FB4-4DA8-BDC6-463E1F78F993" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0FCDFCF-A549-43EC-BFF7-B1A650F5CC99" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63E8ECCB-9AD0-4EEC-880F-2373F4ACBECE" }, { "criteria": "cpe:2.3:a:sap:netweaver_internet_communication_manager_\\(krnl64uc\\):7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1B76177-38D4-47CE-85CF-8B78DD368DE9" } ], "operator": "OR" } ] } ]