Описание
The Telnet interface in the SAP J2EE Engine Core (SAP-JEECOR) 6.40 through 7.02, and Server Core (SERVERCORE) 7.10 through 7.30 allows remote authenticated users to bypass a security check and conduct SMB relay attacks via unspecified vectors.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:sap:j2ee_engine_core:6.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:j2ee_engine_core:7.00:*:*:*:*:*:*:*
cpe:2.3:a:sap:j2ee_engine_core:7.01:*:*:*:*:*:*:*
cpe:2.3:a:sap:j2ee_engine_core:7.02:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:a:sap:server_core:7.10:*:*:*:*:*:*:*
cpe:2.3:a:sap:server_core:7.11:*:*:*:*:*:*:*
cpe:2.3:a:sap:server_core:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:server_core:7.30:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00341
Низкий
4.9 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
The Telnet interface in the SAP J2EE Engine Core (SAP-JEECOR) 6.40 through 7.02, and Server Core (SERVERCORE) 7.10 through 7.30 allows remote authenticated users to bypass a security check and conduct SMB relay attacks via unspecified vectors.
EPSS
Процентиль: 56%
0.00341
Низкий
4.9 Medium
CVSS2
Дефекты
CWE-264