High severity8.8NVD Advisory· Published Dec 12, 2017· Updated May 13, 2026
CVE-2017-16689
CVE-2017-16689
Description
A Trusted RFC connection in SAP KERNEL 32NUC, SAP KERNEL 32Unicode, SAP KERNEL 64NUC, SAP KERNEL 64Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49, can be established to a different client or a different user on the same system, although no explicit Trusted/Trusting Relation to the same system has been defined.
Affected products
7cpe:2.3:a:sap:sap_kernel:7.21:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:sap:sap_kernel:7.21:*:*:*:*:*:*:*
- cpe:2.3:a:sap:sap_kernel:7.21ext:*:*:*:*:*:*:*
- cpe:2.3:a:sap:sap_kernel:7.22:*:*:*:*:*:*:*
- cpe:2.3:a:sap:sap_kernel:7.22ext:*:*:*:*:*:*:*
- cpe:2.3:a:sap:sap_kernel:7.45:*:*:*:*:*:*:*
- cpe:2.3:a:sap:sap_kernel:7.49:*:*:*:*:*:*:*
- SAP/Trusted RFC connectionv5Range: SAP KERNEL 32NUC; SAP KERNEL 32Unicode; SAP KERNEL64NUC; SAP KERNEL64 Unicode 7.21, 7.21EXT, 7.22, 7.22EXT; SAP KERNEL from 7.21 to 7.22, 7.45, 7.49
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/102144nvdThird Party AdvisoryVDB Entry
- blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/nvdIssue TrackingVendor Advisory
- launchpad.support.sap.comnvdPermissions RequiredVendor Advisory
News mentions
0No linked articles in our index yet.