SAP Gateway 10Kblaze Remote Code Execution Vulnerability.

High Nessus Plugin ID 126003


The remote application is susceptible to remote code execution.


A remote code execution vulnerability exists in the remote SAP Gateway as a result of allowing non-SAP applications to communicate with, and potentially run OS commands on SAP applications. An unauthenticated attacker can run the arbitrary commands on remote server to gain access to the system or to read/write sensitive information


Refer to US-CERT advisory and vendor documentation for guidance on mitigation.

See Also

Plugin Details

Severity: High

ID: 126003

File Name: sap_gw_rce_detect.nbin

Version: 1.9

Type: remote

Family: General

Published: 2019/06/19

Updated: 2020/06/12

Dependencies: 22964

Asset Inventory: True

Risk Information

Risk Factor: High

CVSS Score Source: manual

CVSS Score Rationale: Score based on typical remote code execution vulnerability

CVSS v2.0

Base Score: 9.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:P

CVSS v3.0

Base Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Vulnerability Information

Exploited by Nessus: true

Vulnerability Publication Date: 2019/05/02