Skip links

Update #1 for security note 1408081, SAP security note 1525125

Description

UPDATE 2: May 14, 2019: With update 2 in SAP Note 1408081, this SAP Note is obsolete.

UPDATE 1: November 3, 2010: Correction of some typing errors.

Changes not taken into account in “Solution” section

Available fix and Supported packages

  • KRNL32NUC | 7.20 | 7.20
  • KRNL32NUC | 7.20EXT | 7.20EXT
  • KRNL32UC | 7.20 | 7.20
  • KRNL32UC | 7.20EXT | 7.20EXT
  • KRNL64NUC | 7.20 | 7.20
  • KRNL64NUC | 7.20EXT | 7.20EXT
  • KRNL64UC | 7.20 | 7.20
  • KRNL64UC | 7.2L | 7.2L
  • KRNL64UC | 7.20EXT | 7.20EXT
  • KRNL64UC | 8.00 | 8.00
  • KERNEL | 7.20 | 7.20
  • KERNEL | 7.2L | 7.2L
  • KERNEL | 8.00 | 8.00

Affected component

    BC-CST-GW
    Gateway/CPIC

CVSS

Score: 4.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1525125

TAGS

#reg_info-sec_info-SNC-Saprouter-DMZ-internal-local-gw/reg_no_conn_info-gw/acl_mode