NA

CVE-2022-41272

Published: 13/12/2022 Updated: 07/11/2023
CVSS v3 Base Score: 8.6 | Impact Score: 4.7 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the malicious user to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sap netweaver process integration 7.50

Github Repositories

Improper access control in SAP NetWeaver Process Integration

CVE-2022-41272 On this repository, we will briefly write information about the CVE-2022-41272 vulnerability The vulnerability exists on the SAP P4 service that runs on the 5NN04 port Where NN is an instance number, that can be from 00-99 There are remote call functions that an attacker can call without any authentication In the following image, you can see the patch release