SAP NetWeaver AS Java Improper Access Control (May 2023)

critical Nessus Plugin ID 175397


The remote SAP NetWeaver application server is affected by improper access control vulnerability.


SAP NetWeaver Application Server for Java is affected by improper access control vulnerability. An unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication. A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Apply the appropriate patch according to the vendor advisory.

See Also

Plugin Details

Severity: Critical

ID: 175397

File Name: sap_netweaver_as_java_may_2023.nasl

Version: 1.3

Type: remote

Family: Web Servers

Published: 5/11/2023

Updated: 5/16/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: High

Base Score: 9.4

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2023-30744


Risk Factor: Critical

Base Score: 9.1

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sap:netweaver_application_server

Required KB Items: Settings/ParanoidReport, installed_sw/SAP Netweaver Application Server (AS)

Exploit Ease: No known exploits are available

Patch Publication Date: 5/9/2023

Vulnerability Publication Date: 5/9/2023

Reference Information

CVE: CVE-2023-30744

IAVA: 2023-A-0241