The ACL (Access Control List) of SAP Message Server -...
High severity
Unreviewed
Published
Aug 8, 2023
to the GitHub Advisory Database
•
Updated Sep 29, 2024
Description
Published by the National Vulnerability Database
Aug 8, 2023
Published to the GitHub Advisory Database
Aug 8, 2023
Last updated
Sep 29, 2024
The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.
References