VYPR
High severity8.8NVD Advisory· Published Dec 12, 2017· Updated May 13, 2026

CVE-2017-16689

CVE-2017-16689

Description

A Trusted RFC connection in SAP KERNEL 32NUC, SAP KERNEL 32Unicode, SAP KERNEL 64NUC, SAP KERNEL 64Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49, can be established to a different client or a different user on the same system, although no explicit Trusted/Trusting Relation to the same system has been defined.

Affected products

7
  • SAP/Sap Kernel6 versions
    cpe:2.3:a:sap:sap_kernel:7.21:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:sap:sap_kernel:7.21:*:*:*:*:*:*:*
    • cpe:2.3:a:sap:sap_kernel:7.21ext:*:*:*:*:*:*:*
    • cpe:2.3:a:sap:sap_kernel:7.22:*:*:*:*:*:*:*
    • cpe:2.3:a:sap:sap_kernel:7.22ext:*:*:*:*:*:*:*
    • cpe:2.3:a:sap:sap_kernel:7.45:*:*:*:*:*:*:*
    • cpe:2.3:a:sap:sap_kernel:7.49:*:*:*:*:*:*:*
  • SAP/Trusted RFC connectionv5
    Range: SAP KERNEL 32NUC; SAP KERNEL 32Unicode; SAP KERNEL64NUC; SAP KERNEL64 Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.