Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability.
| Software | From | Fixed in |
|---|---|---|
| sap / netweaver_as_abap | kernel_7.49 | kernel_7.49.x |
| sap / netweaver_as_abap | kernel_7.77 | kernel_7.77.x |
| sap / netweaver_as_abap | kernel_7.81 | kernel_7.81.x |
| sap / netweaver_as_abap_krnl64uc | 7.49 | 7.49.x |
| sap / netweaver_as_abap_krnl64nuc | 7.49 | 7.49.x |
| sap / router | 7.22 | 7.22.x |
| sap / router | 7.53 | 7.53.x |
| sap / netweaver_as_abap | kernel_7.85 | kernel_7.85.x |
| sap / netweaver_as_abap | kernel_7.86 | kernel_7.86.x |
| sap / netweaver_as_abap | kernel_7.87 | kernel_7.87.x |
| sap / netweaver_as_abap | kernel_7.88 | kernel_7.88.x |