Vulnerability Description
A Trusted RFC connection in SAP KERNEL 32NUC, SAP KERNEL 32Unicode, SAP KERNEL 64NUC, SAP KERNEL 64Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49, can be established to a different client or a different user on the same system, although no explicit Trusted/Trusting Relation to the same system has been defined.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Sap Kernel | 7.21 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102144Third Party AdvisoryVDB Entry
- https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/Issue TrackingVendor Advisory
- https://launchpad.support.sap.com/#/notes/2449757Permissions RequiredVendor Advisory
- http://www.securityfocus.com/bid/102144Third Party AdvisoryVDB Entry
- https://blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/Issue TrackingVendor Advisory
- https://launchpad.support.sap.com/#/notes/2449757Permissions RequiredVendor Advisory
FAQ
What is CVE-2017-16689?
CVE-2017-16689 is a vulnerability with a CVSS score of 8.8 (HIGH). A Trusted RFC connection in SAP KERNEL 32NUC, SAP KERNEL 32Unicode, SAP KERNEL 64NUC, SAP KERNEL 64Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49, can be established to...
How severe is CVE-2017-16689?
CVE-2017-16689 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16689?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Sap Kernel.