{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SAP UI 700 version 2.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Knowledge Warehouse versions 7.30, 7.31, 7.40 et 7.50","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP GRC Access Control versions V1100_700, V1100_731 et V1200_750","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP UI versions 7.5, 7.51, 7.52, 7.53 et 7.54","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business Client version 6.5","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP S/4HANA versions 1511, 1610, 1709, 1809, 1909, 2020 et 2021","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP 3D Visual Enterprise Viewer version 9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Commerce version 2001","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Commerce versions 1905, 2005, 2105 et 2011","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Landscape Transformation version 2.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAF-T Framework versions SAP_FIN 617, 618, 720, 730, SAP_APPL 600, 602, 603, 604, 605, 606, S4CORE 102, 103, 104 et 105","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Web Dispatcher and Internet Communication Manager versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP LTRS for S/4HANA version 1.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Test Data Migration Server version 4.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP LT Replication Server versions 2.0 et 3.0","product":{"name":"Replication Server","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business One version 10","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP ABAP Server & ABAP Platform (Translation Tools) versions 701, 740,750,751,752,753,754,755,756 et 804","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence Platform version 420","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS ABAP versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755 et 756","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-21343","url":"https://www.cve.org/CVERecord?id=CVE-2021-21343"},{"name":"CVE-2021-44233","url":"https://www.cve.org/CVERecord?id=CVE-2021-44233"},{"name":"CVE-2021-42063","url":"https://www.cve.org/CVERecord?id=CVE-2021-42063"},{"name":"CVE-2021-21348","url":"https://www.cve.org/CVERecord?id=CVE-2021-21348"},{"name":"CVE-2021-21344","url":"https://www.cve.org/CVERecord?id=CVE-2021-21344"},{"name":"CVE-2021-21341","url":"https://www.cve.org/CVERecord?id=CVE-2021-21341"},{"name":"CVE-2021-38176","url":"https://www.cve.org/CVERecord?id=CVE-2021-38176"},{"name":"CVE-2021-44231","url":"https://www.cve.org/CVERecord?id=CVE-2021-44231"},{"name":"CVE-2019-0388","url":"https://www.cve.org/CVERecord?id=CVE-2019-0388"},{"name":"CVE-2021-44235","url":"https://www.cve.org/CVERecord?id=CVE-2021-44235"},{"name":"CVE-2021-42061","url":"https://www.cve.org/CVERecord?id=CVE-2021-42061"},{"name":"CVE-2021-21347","url":"https://www.cve.org/CVERecord?id=CVE-2021-21347"},{"name":"CVE-2021-21346","url":"https://www.cve.org/CVERecord?id=CVE-2021-21346"},{"name":"CVE-2021-33683","url":"https://www.cve.org/CVERecord?id=CVE-2021-33683"},{"name":"CVE-2021-42069","url":"https://www.cve.org/CVERecord?id=CVE-2021-42069"},{"name":"CVE-2021-21351","url":"https://www.cve.org/CVERecord?id=CVE-2021-21351"},{"name":"CVE-2021-21345","url":"https://www.cve.org/CVERecord?id=CVE-2021-21345"},{"name":"CVE-2021-42070","url":"https://www.cve.org/CVERecord?id=CVE-2021-42070"},{"name":"CVE-2021-37714","url":"https://www.cve.org/CVERecord?id=CVE-2021-37714"},{"name":"CVE-2021-21349","url":"https://www.cve.org/CVERecord?id=CVE-2021-21349"},{"name":"CVE-2021-42064","url":"https://www.cve.org/CVERecord?id=CVE-2021-42064"},{"name":"CVE-2021-44232","url":"https://www.cve.org/CVERecord?id=CVE-2021-44232"},{"name":"CVE-2021-42068","url":"https://www.cve.org/CVERecord?id=CVE-2021-42068"},{"name":"CVE-2021-21342","url":"https://www.cve.org/CVERecord?id=CVE-2021-21342"},{"name":"CVE-2021-42066","url":"https://www.cve.org/CVERecord?id=CVE-2021-42066"},{"name":"CVE-2021-21350","url":"https://www.cve.org/CVERecord?id=CVE-2021-21350"}],"links":[],"reference":"CERTFR-2021-AVI-948","revisions":[{"description":"Version initiale","revision_date":"2021-12-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SAP du 14 d\u00e9cembre 2021","url":"https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021"}]}
