ID

VAR-202106-1808


CVE

CVE-2021-27628


TITLE

SAP NetWeaver ABAP Server  and  ABAP Platform  Input confirmation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-007951

DESCRIPTION

SAP NetWeaver ABAP Server and ABAP Platform (Dispatcher), versions - KRNL32NUC - 7.22,7.22EXT, KRNL32UC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method DpRTmPrepareReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP NetWeaver ABAP Server and ABAP Platform (Dispatcher) Is vulnerable to input validation.Denial of service (DoS) It may be put into a state. ## Advisory Information - Public Release Date: 11/22/2021 - Security Advisory ID: ONAPSIS-2021-0015 - Researcher(s): Yvan Genuer ## Vulnerability Information - Vendor: SAP - Affected Components: All SAP kernel 32 and 64 bits, unicode and no-unicode - SAP KERNEL 7.22 - SAP KERNEL 7.22EXT - SAP KERNEL 7.49 - SAP KERNEL 7.53 - SAP KERNEL 7.73 - SAP KERNEL 7.77 - SAP KERNEL 7.81 - SAP KERNEL 8.04 (Check SAP Note 3021197 for detailed information on affected releases) - Vulnerability Class: CWE-20, CWE-125, CWE-476 - CVSS v3 score: 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - Risk Level: High - Assigned CVE: CVE-2021-27628 CVE-2021-27607 - Vendor patch Information: SAP Security NOTE 3021197 ## Affected Components Description The SAP dispatcher service is part of SAP Kernel. Mandatory, it manage, gather and collect the requests from end users then forward them to work process. ## Vulnerability Details CVE-2021-27607 : A NULL pointer dereference exist in `ThSncIn(REQUEST_BUF**, unsigned char)`, where `_Z10DpCaGetPtri` tries to read a part of input controlled by an attacker, then return 0x0 instead of a pointer to normal value if the input is 0xffffffff. If an attacker crafts a valid SAP Dispatcher packet, with valid header, but with a total packet size smaller than normal, the subtraction operation results in a negative value. Also if this negative value is anticipated and put in the same packet at a particular offset, the check operation that compares the two values will pass, and this value is used as size during the next operation. ## Solution SAP has released SAP Note 3021197 which provide patched versions of the affected components. The patches can be downloaded from https://launchpad.support.sap.com/#/notes/3021197. Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks. ## Report Timeline - 02/01/2021: Onapsis sends details to SAP - 02/04/2021: SAP provides internal ID - 02/08/2021: SAP confirms CVSS - 06/09/2021: SAP releases SAP Note fixing the issue. - 11/21/2021: Advisory published ## References - Onapsis blogpost: https://www.onapsis.com/blog/sap-security-patch-day-june-2021-multiple-memory-corruption-vulnerabilities-can-lead-system - CVE Mitre: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27607 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27628 - Vendor Patch: https://launchpad.support.sap.com/#/notes/3021197 ## About Onapsis Research Labs Onapsis Research Labs provides the industry analysis of key security issues that impact business-critical systems and applications. Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community. Find all reported vulnerabilities at https://github.com/Onapsis/vulnerability_advisories ## About Onapsis, Inc. Onapsis protects the mission-critical applications that run the global economy, from the core to the cloud. The Onapsis Platform uniquely delivers actionable insight, secure change, automated governance and continuous monitoring for critical systems—ERP, CRM, PLM, HCM, SCM and BI applications—from leading vendors such as SAP, Oracle, Salesforce and others, while keeping them protected and compliant. For more information, connect with us on Twitter or LinkedIn, or visit us at https://www.onapsis.com. ## License This advisory is licensed under a [Creative Commons 4.0 BY-ND International License](https://creativecommons.org/licenses/by-nd/4.0/legalcode) <br><br><img src="../../images/license_cc.png" align="left" height="36" width="112" > -- This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited

Trust: 1.8

sources: NVD: CVE-2021-27628 // JVNDB: JVNDB-2021-007951 // VULMON: CVE-2021-27628 // PACKETSTORM: 164591

AFFECTED PRODUCTS

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.73

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64uc_7.53

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.53

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64uc_7.22

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_8.04

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64nuc_7.49

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.81

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl32uc_7.22

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.82

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl32nuc_7.22ext

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64uc_7.49

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64uc_7.73

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64uc_7.22ext

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64nuc_7.22ext

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64nuc_7.22

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.49

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl32uc_7.22ext

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.77

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.22

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:kernel_7.83

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl32nuc_7.22

Trust: 1.0

vendor:sapmodel:netweaver as abapscope:eqversion:krnl64uc_8.04

Trust: 1.0

vendor:sapmodel:netweaver as abapscope: - version: -

Trust: 0.8

vendor:sapmodel:netweaver as abapscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-007951 // NVD: CVE-2021-27628

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2021-27628
value: HIGH

Trust: 1.8

CNNVD: CNNVD-202106-460
value: HIGH

Trust: 0.6

VULMON: CVE-2021-27628
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-27628
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

NVD: CVE-2021-27628
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-27628
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-27628 // JVNDB: JVNDB-2021-007951 // CNNVD: CNNVD-202106-460 // NVD: CVE-2021-27628

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Incorrect input confirmation (CWE-20) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-007951 // NVD: CVE-2021-27628

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-460

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202106-460

CONFIGURATIONS

sources: NVD: CVE-2021-27628

PATCH

title:SAP Security Patch Day - June 2021url:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=578125999

Trust: 0.8

title:SAP Netweaver Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=154806

Trust: 0.6

sources: JVNDB: JVNDB-2021-007951 // CNNVD: CNNVD-202106-460

EXTERNAL IDS

db:NVDid:CVE-2021-27628

Trust: 3.4

db:PACKETSTORMid:164591

Trust: 2.6

db:JVNDBid:JVNDB-2021-007951

Trust: 0.8

db:CNNVDid:CNNVD-202106-460

Trust: 0.6

db:VULMONid:CVE-2021-27628

Trust: 0.1

sources: VULMON: CVE-2021-27628 // JVNDB: JVNDB-2021-007951 // PACKETSTORM: 164591 // CNNVD: CNNVD-202106-460 // NVD: CVE-2021-27628

REFERENCES

url:http://packetstormsecurity.com/files/164591/sap-netweaver-abap-dispatcher-service-memory-corruption.html

Trust: 3.1

url:http://seclists.org/fulldisclosure/2021/oct/27

Trust: 2.6

url:https://launchpad.support.sap.com/#/notes/3021197

Trust: 1.8

url:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=578125999

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-27628

Trust: 0.9

url:https://vigilance.fr/vulnerability/sap-multiple-vulnerabilities-of-june-2021-35633

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27607

Trust: 0.1

url:https://launchpad.support.sap.com/#/notes/3021197.

Trust: 0.1

url:https://www.onapsis.com.

Trust: 0.1

url:https://creativecommons.org/licenses/by-nd/4.0/legalcode)

Trust: 0.1

url:https://github.com/onapsis/vulnerability_advisories

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27628

Trust: 0.1

url:https://www.onapsis.com/blog/sap-security-patch-day-june-2021-multiple-memory-corruption-vulnerabilities-can-lead-system

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27607

Trust: 0.1

sources: VULMON: CVE-2021-27628 // JVNDB: JVNDB-2021-007951 // PACKETSTORM: 164591 // CNNVD: CNNVD-202106-460 // NVD: CVE-2021-27628

CREDITS

Yvan Genuer

Trust: 0.1

sources: PACKETSTORM: 164591

SOURCES

db:VULMONid:CVE-2021-27628
db:JVNDBid:JVNDB-2021-007951
db:PACKETSTORMid:164591
db:CNNVDid:CNNVD-202106-460
db:NVDid:CVE-2021-27628

LAST UPDATE DATE

2022-05-04T09:32:26.213000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-27628date:2021-10-22T00:00:00
db:JVNDBid:JVNDB-2021-007951date:2022-02-28T08:20:00
db:CNNVDid:CNNVD-202106-460date:2021-10-25T00:00:00
db:NVDid:CVE-2021-27628date:2021-11-04T13:40:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-27628date:2021-06-09T00:00:00
db:JVNDBid:JVNDB-2021-007951date:2022-02-28T00:00:00
db:PACKETSTORMid:164591date:2021-10-22T15:30:17
db:CNNVDid:CNNVD-202106-460date:2021-06-08T00:00:00
db:NVDid:CVE-2021-27628date:2021-06-09T14:15:00