Vulnerability Details CVE-2021-38162
SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.3%
CVSS Severity
CVSS v3 Score 8.9
CVSS v2 Score 7.5
Products affected by CVE-2021-38162
-
cpe:2.3:a:sap:web_dispatcher:7.22ext
-
cpe:2.3:a:sap:web_dispatcher:7.49
-
cpe:2.3:a:sap:web_dispatcher:7.53
-
cpe:2.3:a:sap:web_dispatcher:7.77
-
cpe:2.3:a:sap:web_dispatcher:7.81
-
cpe:2.3:a:sap:web_dispatcher:7.83
-
cpe:2.3:a:sap:web_dispatcher:kernel_7.22
-
cpe:2.3:a:sap:web_dispatcher:krnl64nuc_7.22
-
cpe:2.3:a:sap:web_dispatcher:krnl64uc_7.22