VARIoT IoT vulnerabilities database
| VAR-201703-0714 | CVE-2017-3811 | Cisco WebEx Meetings Server In XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
An XML External Entity vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to have read access to part of the information stored in the affected system. More Information: CSCvc39165. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.2054.
An attacker can exploit this issue to gain access to sensitive information that may lead to further attacks.
This issue is being tracked by Cisco bug ID CSCvc39165. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution. The vulnerability stems from the fact that the program does not correctly handle XXE external entities when parsing XML files
| VAR-201703-0710 | CVE-2017-3815 | Cisco TelePresence Server Vulnerability in software emulating the endpoint of the server |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An API Privilege vulnerability in Cisco TelePresence Server Software could allow an unauthenticated, remote attacker to emulate Cisco TelePresence Server endpoints. Affected Products: This vulnerability affects Cisco TelePresence Server MSE 8710 Processors that are running a software release prior to Cisco TelePresence Software Release 4.3 and are running in locally managed mode. The vulnerable API was deprecated in Cisco TelePresence Software Release 4.3. More Information: CSCvc37616.
An attacker can exploit this issue to gain elevated privileges on an affected device.
This issue is being tracked by Cisco Bug ID CSCvc37616. Mobility Services Engine (MSE) is a set of platforms (mobile service engine) that can provide Wi-Fi services. The platform collects, stores and manages data from wireless clients, Cisco access points and controllers. 8710 Processors is one of those processes
| VAR-201703-0894 | CVE-2017-3866 | Cisco Prime Service Catalog of Web Cross-site scripting vulnerability in framework code |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web framework code of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCvc79842 CSCvc79846 CSCvc79855 CSCvc79873 CSCvc79882 CSCvc79891. Known Affected Releases: 11.1.2.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
These issues are being tracked by Cisco Bug IDs CSCvc79842, CSCvc79846, CSCvc79855, CSCvc79873, CSCvc79882, and CSCvc79891. The solution supports automated ordering of a unified service catalog of computing, networking, storage, and other data center resources. The vulnerability stems from the fact that the program does not fully verify the parameters passed to the Web server
| VAR-201703-0895 | CVE-2017-3867 | Cisco Adaptive Security Appliance Software Border Gateway Protocol and Bidirectional Forwarding Detection Specific in the implementation of TCP and UDP For traffic ACL Vulnerability to avoid |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the Border Gateway Protocol (BGP) Bidirectional Forwarding Detection (BFD) implementation of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to bypass the access control list (ACL) for specific TCP and UDP traffic. More Information: CSCvc68229. Known Affected Releases: 9.6(2). Known Fixed Releases: 99.1(20.1) 99.1(10.2) 98.1(12.7) 98.1(1.49) 97.1(6.58) 97.1(0.134) 96.2(0.109) 9.7(1.1) 9.6(2.99) 9.6(2.8). Cisco Adaptive Security Appliance Software is prone to a security-bypass vulnerability.
Remote attackers can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCvc68229
| VAR-201703-0882 | CVE-2017-3869 | Cisco Prime Infrastructure for API Should be restricted to privileged users in API Vulnerabilities accessed by |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: MEDIUM |
An API Credentials Management vulnerability in the APIs for Cisco Prime Infrastructure could allow an authenticated, remote attacker to access an API that should be restricted to a privileged user. The attacker needs to have valid credentials. More Information: CSCuy36192. Known Affected Releases: 3.1(1) 3.1(1). Cisco Prime Infrastructure (PI) is a product of Cisco. PI is a solution for wireless management through Cisco PrimeNetwork Management Solution (LMS) and Cisco Prime Network Control System (NCS) technology. A security bypass vulnerability exists in Cisco Prime Infrastructure. A remote attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized operations. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCuy36192. The vulnerability stems from the program's insufficient implementation of role-based access control on APIs
| VAR-201703-0883 | CVE-2017-3870 | Cisco Web Security Appliance of Cisco AsyncOS Software URL Already set in the filtering function URL Vulnerabilities that bypass filter rules |
CVSS V2: 5.0 CVSS V3: 5.8 Severity: MEDIUM |
A vulnerability in the URL filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured URL filter rule. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA), both virtual and hardware appliances, that are configured with URL filters for email scanning. More Information: CSCvc69700. Known Affected Releases: 8.5.3-069 9.1.1-074 9.1.2-010. CiscoAsyncOSforWebSecurityAppliance (WSA) is a product of Cisco Systems, Inc., which is a network security device. Cisco AsyncOS is a set of operating systems used in this product. A remote security bypass vulnerability exists in CiscoAsyncOS forWebSecurityApplianc. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions, resulting in further attacks. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCvc69700. The vulnerability stems from the fact that the program does not fully authenticate user requests
| VAR-201703-0884 | CVE-2017-3871 | Cisco Prime Optical for Service Providers Information Disclosure Vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A RADIUS Secret Disclosure vulnerability in the web network management interface of Cisco Prime Optical for Service Providers could allow an authenticated, remote attacker to disclose sensitive information in the configuration generated for a device. The attacker must have valid credentials for the device. More Information: CSCvc65257. Known Affected Releases: 10.6(0.1). Cisco PrimeOOtical is a suite of services for service providers that integrate converged IP and optical transport networks. It supports automatic configuration, resource allocation and troubleshooting to help operators perform end-to-end circuit creation more efficiently. A Cisco Information Disclosure vulnerability exists for CiscoPrimeOptical for ServiceProviders. Attackers can exploit vulnerabilities to obtain sensitive information. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCvc65257. The web network management interface is one of the web-based network management interfaces
| VAR-201703-0886 | CVE-2017-3874 | Cisco Unified Communications Manager of Web Cross-site scripting vulnerability in framework |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web framework of Cisco Unified Communications Manager (CallManager) could allow an authenticated, remote attacker to perform a cross-site scripting (XSS) attack. More Information: CSCvb70033. Known Affected Releases: 11.5(1.11007.2). Known Fixed Releases: 12.0(0.98000.507) 11.0(1.23900.5) 11.0(1.23900.3) 10.5(2.15900.2).
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvb70033. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201703-0887 | CVE-2017-3875 | Cisco Nexus 7000 Vulnerabilities that bypass specific access control filtering mechanisms in series switches |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0. Vendors have confirmed this vulnerability Bug ID CSCtz59354 It is released as.Access control list by remote attacker (ACL) You may be able to avoid the predefined traffic set in. The Cisco Nexus 7000 Series Switches is a Cisco 7000 Series switch from Cisco. An attacker could exploit the vulnerability to bypass some security restrictions and perform unauthorized actions and launch further attacks. This may aid in further attacks.
This issue is being tracked by Cisco Bug ID CSCtz59354. A remote attacker could exploit this vulnerability by issuing specially crafted commands to bypass rulesets on Network Time Protocol (NTP) ACLs
| VAR-201703-0888 | CVE-2017-3877 | Cisco Unified Communications Manager of Web Cross-site request forgery vulnerability in framework |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web framework of Cisco Unified Communications Manager (CallManager) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web interface of the affected software. More Information: CSCvb70021. Known Affected Releases: 11.5(1.11007.2).
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible.
This issue is being tracked by Cisco bug ID CSCvb70021. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201703-0889 | CVE-2017-3878 | Cisco Nexus 9000 Runs on a series switch Cisco NX-OS Software Telnet Service operation interruption in remote login function (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A Denial of Service vulnerability in the Telnet remote login functionality of Cisco NX-OS Software running on Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause a Telnet process used for login to terminate unexpectedly and the login attempt to fail. There is no impact to user traffic flowing through the device. Affected Products: This vulnerability affects Cisco Nexus 9000 Series Switches that are running Cisco NX-OS Software and are configured to allow remote Telnet connections to the device. More Information: CSCux46778. Known Affected Releases: 7.0(3)I3(0.170). Known Fixed Releases: 7.0(3)I3(1) 7.0(3)I3(0.257) 7.0(3)I3(0.255) 7.0(3)I2(2e) 7.0(3)F1(1.22) 7.0(3)F1(1). Vendors have confirmed this vulnerability Bug ID CSCux46778 It is released as.Remote attacker could disrupt service operation (DoS) There is a possibility of being put into a state. Cisco NX-OS is a data center-class operating system from Cisco Systems, Inc. that reflects modular design, resiliency, and maintainability. A denial of service vulnerability exists in Cisco NX-OSSoftware. An attacker could exploit this vulnerability to cause a denial of service and refuse to provide services to legitimate users.
This issue is being tracked by Cisco bug ID CSCux46778. A remote attacker can interrupt the Telnet process
| VAR-201703-0891 | CVE-2017-3880 | Cisco WebEx Meetings Server Vulnerabilities that bypass authentication |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
An Authentication Bypass vulnerability in Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to access limited meeting information on the Cisco WebEx Meetings Server. More Information: CSCvd50728. Known Affected Releases: 2.6 2.7 2.8 CWMS-2.5MR1 Orion1.1.2.patch T29_orion_merge.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks.
This issue is tracked by Cisco Bug ID CSCvd50728. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution. An authentication bypass vulnerability exists in CWMS
| VAR-201703-0711 | CVE-2017-3819 | Cisco ASR 5000 Series devices and Virtualized Packet Core of StarOS Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A privilege escalation vulnerability in the Secure Shell (SSH) subsystem in the StarOS operating system for Cisco ASR 5000 Series, ASR 5500 Series, ASR 5700 Series devices, and Cisco Virtualized Packet Core could allow an authenticated, remote attacker to gain unrestricted, root shell access. The vulnerability is due to missing input validation of parameters passed during SSH or SFTP login. An attacker could exploit this vulnerability by providing crafted user input to the SSH or SFTP command-line interface (CLI) during SSH or SFTP login. An exploit could allow an authenticated attacker to gain root privileges access on the router. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered via both IPv4 and IPv6 traffic. An established TCP connection toward port 22, the SSH default port, is needed to perform the attack. The attacker must have valid credentials to login to the system via SSH or SFTP. The following products have been confirmed to be vulnerable: Cisco ASR 5000/5500/5700 Series devices running StarOS after 17.7.0 and prior to 18.7.4, 19.5, and 20.2.3 with SSH configured are vulnerable. Cisco Virtualized Packet Core - Single Instance (VPC-SI) and Distributed Instance (VPC-DI) devices running StarOS prior to N4.2.7 (19.3.v7) and N4.7 (20.2.v0) with SSH configured are vulnerable. Cisco Bug IDs: CSCva65853. Vendors have confirmed this vulnerability Bug ID CSCva65853 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. CiscoStarOS is a set of operating systems operated by Cisco Systems Inc. in a series of routers such as 5000. A privilege elevation vulnerability exists in CiscoStarOS. Cisco StarOS is prone to a privilege-escalation vulnerability. Cisco ASR 5500 Series and so on are the 5500 and other series router equipment of Cisco (Cisco). There is a privilege escalation vulnerability in the SSH subsystem of the StarOS operating system in many Cisco products.
Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asr ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asr"]
-----BEGIN PGP SIGNATURE-----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=Lk6U
-----END PGP SIGNATURE-----
| VAR-201703-0713 | CVE-2017-3831 | Cisco Mobility Express 1800 Vulnerability related to authorization, authority, and access control in software of series access point |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219. Vendors have confirmed this vulnerability Bug ID CSCuy68219 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. This may lead to further attacks. web-based GUI is a web-based graphical user interface used in it.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800"]
-----BEGIN PGP SIGNATURE-----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=Xeal
-----END PGP SIGNATURE-----
| VAR-201703-0715 | CVE-2017-3846 | Cisco Workload Automation and Tidal Enterprise Scheduler Vulnerable to incorrect input validation |
CVSS V2: 5.0 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the Client Manager Server of Cisco Workload Automation and Cisco Tidal Enterprise Scheduler could allow an unauthenticated, remote attacker to retrieve any file from the Client Manager Server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted URL to the Client Manager Server. An exploit could allow the attacker to retrieve any file from the Cisco Workload Automation or Cisco Tidal Enterprise Scheduler Client Manager Server. This vulnerability affects the following products: Cisco Tidal Enterprise Scheduler Client Manager Server releases 6.2.1.435 and later, Cisco Workload Automation Client Manager Server releases 6.3.0.116 and later. Cisco Bug IDs: CSCvc90789. Vendors have confirmed this vulnerability Bug ID CSCvc90789 It is released as.Information may be obtained. Multiple Cisco Products are prone to a security vulnerability that allows remote attackers to read arbitrary files.
Successful exploits may allow an attacker to read arbitrary files in the context of the user running the affected application. This may aid in further attacks. TES a set of work automation solutions. The solution simplifies the way enterprise-wide job scheduling and automated business processes are defined, managed and delivered. CWA is a suite of software for optimizing data center workload management.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-tes ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-tes"]
-----BEGIN PGP SIGNATURE-----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=HobL
-----END PGP SIGNATURE-----
| VAR-201703-0907 | CVE-2017-3854 | Cisco Wireless LAN Controller Software mesh code authentication vulnerability |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the mesh code of Cisco Wireless LAN Controller (WLC) software could allow an unauthenticated, remote attacker to impersonate a WLC in a meshed topology. The vulnerability is due to insufficient authentication of the parent access point in a mesh configuration. An attacker could exploit this vulnerability by forcing the target system to disconnect from the correct parent access point and reconnect to a rogue access point owned by the attacker. An exploit could allow the attacker to control the traffic flowing through the impacted access point or take full control of the target system. This vulnerability affects the following products running a vulnerable version of Wireless LAN Controller software and configured for meshed mode: Cisco 8500 Series Wireless Controller, Cisco 5500 Series Wireless Controller, Cisco 2500 Series Wireless Controller, Cisco Flex 7500 Series Wireless Controller, Cisco Virtual Wireless Controller, Wireless Services Module 2 (WiSM2). Note that additional configuration is needed in addition to upgrading to a fixed release. Cisco Bug IDs: CSCuc98992 CSCuu14804. Vendors have confirmed this vulnerability Bug ID CSCuc98992 and CSCuu14804 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. There is a remote security bypass vulnerability in Cisco WirelessLANController. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions, resulting in further attacks. This may aid in further attacks. This product provides functions such as security policy and intrusion detection in wireless LAN
| VAR-201804-1048 | CVE-2017-6910 | Kaazing Gateway of WebSocket engine Information disclosure vulnerability in components |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling. Kaazing Gateway of WebSocket engine The component contains an information disclosure vulnerability.Information may be obtained. A remote attacker could exploit this vulnerability to bypass access restrictions and obtain sensitive information. The following versions are affected: Kaazing Gateway 4.5.3 prior to hotfix-1; Gateway (JMS version) 4.0.5 prior to hotfix-15, 4.0.6 prior to 4.0.6 hotfix-4, 4.0.7, 4.0. 9 Version 4.0.9 before hotfix-19, version 4.4.x before 4.4.2 hotfix-1, version 4.5.x before 4.5.3 hotfix-1; Gateway (Community Edition and Enterprise Edition) version 5.6.0 before
| VAR-201712-0129 | CVE-2017-3192 | D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 do not sufficiently protect administrator credentials. The tools_admin.asp page discloses the administrator password in base64 encoding in the returned web page. A remote attacker with access to this page (potentially through a authentication bypass such as CVE-2017-3191) may obtain administrator credentials for the device. D-LinkDIR-130 and DIR-330 are both D-Link wireless router products. The vulnerability stems from the program not fully protecting the administrator certificate
| VAR-201703-0462 | CVE-2016-9368 | Eaton xComfort Ethernet Communication Interface Unauthorized Access Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in Eaton xComfort Ethernet Communication Interface (ECI) Versions 1.07 and prior. By accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access files without authenticating. Eaton xComfort is a smart home solution from Eaton, USA. The program includes a wireless home automation system that provides home security and energy management features. There are security vulnerabilities in Eaton xComfort ECI 1.07 and earlier. An unauthorized attacker could exploit the vulnerability to access files
| VAR-201703-1156 | CVE-2017-6950 |
SAP GUI In Vulnerabilities that circumvent security policy restrictions
Related entries in the VARIoT exploits database: VAR-E-201703-0444 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
SAP GUI 7.2 through 7.5 allows remote attackers to bypass intended security policy restrictions and execute arbitrary code via a crafted ABAP code, aka SAP Security Note 2407616. SAP GUI is prone to a remote code-execution vulnerability.
An attacker may exploit this issue to execute arbitrary code within the context of the affected application. The title and technical details have been changed to better reflect the vulnerability impact