Vulnerability Name:

CVE-2022-27668 (CCN-228774)

Assigned:2022-06-14
Published:2022-06-14
Updated:2022-10-27
Summary:Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
Vulnerability Type:CWE-863
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2022-27668

Source: MISC
Type: Exploit, Third Party Advisory
http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html

Source: FULLDISC
Type: Exploit, Mailing List, Third Party Advisory
20220915 SEC Consult SA-20220914-0 :: Improper Access Control in SAP SAProuter

Source: XF
Type: UNKNOWN
sap-cve202227668-cmd-exec(228774)

Source: CCN
Type: SAP Web site
SAP Support Note 3158375

Source: MISC
Type: Permissions Required, Vendor Advisory
https://launchpad.support.sap.com/#/notes/3158375

Source: CCN
Type: Packet Storm Security [09-16-2022]
SAP SAProuter Improper Access Control

Source: CCN
Type: SAP Security Patch Day - June 2022
SAP Security Patch Day - June 2022

Source: MISC
Type: Vendor Advisory
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sap:netweaver_as_abap:kernel_7.49:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap:kernel_7.77:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap:kernel_7.81:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap_krnl64uc:7.49:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap_krnl64nuc:7.49:*:*:*:*:*:*:*
  • OR cpe:/a:sap:router:7.22:*:*:*:*:*:*:*
  • OR cpe:/a:sap:router:7.53:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap:kernel_7.85:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap:kernel_7.86:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap:kernel_7.87:*:*:*:*:*:*:*
  • OR cpe:/a:sap:netweaver_as_abap:kernel_7.88:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sap netweaver as abap kernel_7.49
    sap netweaver as abap kernel_7.77
    sap netweaver as abap kernel_7.81
    sap netweaver as abap krnl64uc 7.49
    sap netweaver as abap krnl64nuc 7.49
    sap router 7.22
    sap router 7.53
    sap netweaver as abap kernel_7.85
    sap netweaver as abap kernel_7.86
    sap netweaver as abap kernel_7.87
    sap netweaver as abap kernel_7.88