Skip links
Picture of Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Potential denial of service in jstart, SAP security note 2259547

Description

An attacker can remotely exploit jstart, rendering it, and potentially the resources that are used to serve jstart, unavailable.

CVSS Information

CVSS v3 Base Score: 7.5 / 10
CVSS v3 Base Vector:

AV : Attack Vector (Related exploit range)

Network (N)

AC : Attack Complexity (Required attack complexity)

Low (L)

PR : Privileges Required (Level of privileges needed to exploit)

None (N)

UI : User Interaction (Required user participation)

None (N)

S : Scope (Change in scope due to impact caused to components beyond the vulnerable component)

Unchanged (U)

C : Impact to Confidentiality

None (N)

I : Impact to Integrity

None (N)

A : Impact to Availability

High (H)

SAP provides this CVSS v3 base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://support.sap.com/securitynotes.

Available fix and Supported packages

  • KRNL32NUC | 7.21 | 7.21
  • KRNL32NUC | 7.21EXT | 7.21EXT
  • KRNL32UC | 7.21 | 7.21
  • KRNL32UC | 7.21EXT | 7.21EXT
  • KRNL64NUC | 7.21 | 7.21
  • KRNL64NUC | 7.21EXT | 7.21EXT
  • KRNL64NUC | 7.42 | 7.42
  • KRNL64NUC | 7.22 | 7.22
  • KRNL64NUC | 7.22EXT | 7.22EXT
  • KRNL64UC | 7.21 | 7.21
  • KRNL64UC | 7.21EXT | 7.21EXT
  • KRNL64UC | 7.42 | 7.42
  • KRNL64UC | 7.22 | 7.22
  • KRNL64UC | 7.22EXT | 7.22EXT
  • KERNEL | 7.21 | 7.22
  • KERNEL | 7.42 | 7.42
  • KERNEL | 7.45 | 7.45
  • KERNEL | 7.46 | 7.46
  • KERNEL | 7.47 | 7.47
  • SAP KERNEL 7.21 32-BIT | SP621 | 000621
  • SAP KERNEL 7.21 32-BIT UNICODE | SP621 | 000621
  • SAP KERNEL 7.21 64-BIT | SP621 | 000621
  • SAP KERNEL 7.21 64-BIT UNICODE | SP621 | 000621
  • SAP KERNEL 7.21 EXT 32-BIT | SP621 | 000621
  • SAP KERNEL 7.21 EXT 32-BIT UC | SP621 | 000621
  • SAP KERNEL 7.21 EXT 64-BIT | SP621 | 000621
  • SAP KERNEL 7.21 EXT 64-BIT UC | SP621 | 000621
  • SAP KERNEL 7.22 64-BIT | | 000100
  • SAP KERNEL 7.22 64-BIT UNICODE | | 000100
  • SAP KERNEL 7.22 EXT 64-BIT | | 000100
  • SAP KERNEL 7.22 EXT 64-BIT UC | | 000100
  • SAP KERNEL 7.42 64-BIT | | 000319
  • SAP KERNEL 7.42 64-BIT UNICODE | | 000319
  • SAP KERNEL 7.45 64-BIT | | 000033
  • SAP KERNEL 7.45 64-BIT UNICODE | | 000033
  • SAP KERNEL 7.46 64-BIT UNICODE | SP020 | 000020
  • SAP KERNEL 7.47 64-BIT UNICODE | SP007 | 000007

Affected component

    BC-JAS-SF
    Startup Framework

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2259547

TAGS

#DoS
#denial-of-service
#jstart

Explore More

RedRays ABAP Security Challenge 2026

WORLD’S FIRST · MAY 30 – 31, 2026 RedRays ABAP Security Challenge 2026 The world’s first security competition for ABAP developers. Write

SAP Security Patch Day – May 2026

SAP has released its May 2026 security patch package containing 15 security notes addressing vulnerabilities across enterprise SAP environments. This release includes