CVE-2021-33684

SAP NetWeaver AS ABAP and ABAP Platform, versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.77, 7.81, 7.84, allows an attacker to send overlong content in the RFC request type thereby crashing the corresponding work process because of memory corruption vulnerability. The work process will attempt to restart itself after the crash and hence the impact on the availability is low.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
sapCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
VendorProductVersion
sapnetweaver_abap
7.21
sapnetweaver_abap
7.21ext:ext
sapnetweaver_abap
7.22
sapnetweaver_abap
7.22ext:ext
sapnetweaver_abap
7.49
sapnetweaver_abap
7.53
sapnetweaver_abap
7.77
sapnetweaver_abap
7.81
sapnetweaver_application_server_abap
7.21
sapnetweaver_application_server_abap
7.21ext:ext
sapnetweaver_application_server_abap
7.22
sapnetweaver_application_server_abap
7.22ext:ext
sapnetweaver_application_server_abap
7.49
sapnetweaver_application_server_abap
7.53
sapnetweaver_application_server_abap
7.77
sapnetweaver_application_server_abap
7.81
𝑥
= Vulnerable software versions