Vulnerability Name:

CVE-2021-40496 (CCN-211195)

Assigned:2021-10-12
Published:2021-10-12
Updated:2022-10-06
Summary:SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details.
CVSS v3 Severity:4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-668
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-40496

Source: XF
Type: UNKNOWN
sap-cve202140496-cmd-exec(211195)

Source: CCN
Type: SAP Web site
SAP Support Note 3087254

Source: MISC
Type: Permissions Required, Vendor Advisory
https://launchpad.support.sap.com/#/notes/3087254

Source: CCN
Type: SAP Security Patch Day - October 2021
SAP Security Patch Day - October 2021

Source: MISC
Type: Vendor Advisory
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:700:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:701:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:702:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:730:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:731:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:740:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:750:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:751:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:752:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:753:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:754:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:755:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:756:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_abap:785:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:730:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_application_server_abap:785:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sap netweaver application server abap 702
    sap netweaver application server abap 750
    sap netweaver application server abap 752
    sap netweaver application server abap 753
    sap netweaver application server abap 754
    sap netweaver application server abap 755
    sap netweaver abap 700
    sap netweaver abap 701
    sap netweaver abap 702
    sap netweaver abap 730
    sap netweaver abap 731
    sap netweaver abap 740
    sap netweaver abap 750
    sap netweaver abap 751
    sap netweaver abap 752
    sap netweaver abap 753
    sap netweaver abap 754
    sap netweaver abap 755
    sap netweaver abap 756
    sap netweaver abap 785
    sap netweaver application server abap 700
    sap netweaver application server abap 701
    sap netweaver application server abap 730
    sap netweaver application server abap 731
    sap netweaver application server abap 740
    sap netweaver application server abap 751
    sap netweaver application server abap 756
    sap netweaver application server abap 785