CVE-2020-6304
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
14/01/2020
Last modified:
24/01/2020
Description
Improper input validation in SAP NetWeaver Internet Communication Manager (update provided in KRNL32NUC & KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT KRNL64NUC & KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49 KERNEL 7.21, 7.49, 7.53) allows an attacker to prevent users from accessing its services through a denial of service.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(kernel\):7.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(kernel\):7.22:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(kernel\):7.49:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(kernel\):7.53:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32nuc\):7.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32nuc\):7.21ext:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32nuc\):7.22:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32nuc\):7.22ext:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32uc\):7.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32uc\):7.21ext:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32uc\):7.22:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl32uc\):7.22ext:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl64nuc\):7.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl64nuc\):7.21ext:*:*:*:*:*:*:* | ||
cpe:2.3:a:sap:netweaver_internet_communication_manager_\(krnl64nuc\):7.22:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page