Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-37491

The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.1%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-37491
  • Sap » Message Server » Version: kernel_7.22
    cpe:2.3:a:sap:message_server:kernel_7.22
  • Sap » Message Server » Version: kernel_7.53
    cpe:2.3:a:sap:message_server:kernel_7.53
  • Sap » Message Server » Version: kernel_7.54
    cpe:2.3:a:sap:message_server:kernel_7.54
  • Sap » Message Server » Version: kernel_7.77
    cpe:2.3:a:sap:message_server:kernel_7.77
  • Sap » Message Server » Version: krnl64nuc_7.22
    cpe:2.3:a:sap:message_server:krnl64nuc_7.22
  • Sap » Message Server » Version: krnl64nuc_7.22ex
    cpe:2.3:a:sap:message_server:krnl64nuc_7.22ex
  • Sap » Message Server » Version: rnl64uc_7.22
    cpe:2.3:a:sap:message_server:rnl64uc_7.22
  • Sap » Message Server » Version: rnl64uc_7.22ext
    cpe:2.3:a:sap:message_server:rnl64uc_7.22ext
  • Sap » Message Server » Version: rnl64uc_7.53
    cpe:2.3:a:sap:message_server:rnl64uc_7.53


Contact Us

Shodan ® - All rights reserved