// For flags

CVE-2021-21469

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

When security guidelines for SAP NetWeaver Master Data Management running on windows have not been thoroughly reviewed, it might be possible for an external operator to try and set custom paths in the MDS server configuration. When no adequate protection has been enforced on any level (e.g., MDS Server password not set, network and OS configuration not properly secured, etc.), a malicious user might define UNC paths which could then be exploited to put the system at risk using a so-called SMB relay attack and obtain highly sensitive data, which leads to Information Disclosure.

Cuando las pautas de seguridad para SAP NetWeaver Master Data Management que se ejecutan en Windows no han sido revisadas a fondo, puede ser posible que un operador externo intente establecer rutas personalizadas en la configuración del servidor MDS. Cuando no ha sido aplicada una protección adecuada en ningún nivel (p. Ej., La contraseña del servidor MDS no se ha establecido, la configuración de la red y del sistema operativo no está apropiadamente protegida, etc.), un usuario malicioso puede definir rutas UNC que luego podrían ser explotadas para poner el sistema en riesgo usando un llamado ataque de retransmisión SMB y obtener datos altamente confidenciales, lo que conlleva a una divulgación de información

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-30 CVE Reserved
  • 2021-01-12 CVE Published
  • 2023-09-28 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sap
Search vendor "Sap"
Netweaver Master Data Management
Search vendor "Sap" for product "Netweaver Master Data Management"
7.10
Search vendor "Sap" for product "Netweaver Master Data Management" and version "7.10"
-
Affected
Sap
Search vendor "Sap"
Netweaver Master Data Management
Search vendor "Sap" for product "Netweaver Master Data Management"
7.10.750
Search vendor "Sap" for product "Netweaver Master Data Management" and version "7.10.750"
-
Affected
Sap
Search vendor "Sap"
Netweaver Master Data Management
Search vendor "Sap" for product "Netweaver Master Data Management"
710
Search vendor "Sap" for product "Netweaver Master Data Management" and version "710"
-
Affected