Full-text search. Typo-tolerant.

CVE-2022-22536 - [KEV] - CVSS 10.0

Overview

CVE-2022-22536 is a critical HTTP request smuggling vulnerability (CVSS 10.0) affecting multiple SAP products, including SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server, and SAP Web Dispatcher. The flaw stems from inconsistent handling of HTTP request boundaries between front-end proxies and back-end SAP application servers. An unauthenticated remote attacker can craft malformed HTTP requests that are interpreted differently by intermediary components, allowing the attacker to prepend arbitrary content to a legitimate victim's subsequent request.

Successful exploitation enables full-context request hijacking: the attacker can execute functions while impersonating an authenticated victim, hijack sessions, steal credentials in transit, bypass authentication controls, and poison shared web caches to deliver malicious content to other users. The vulnerability was added to CISA's Known Exploited Vulnerabilities (KEV) catalog on 2022-08-18, and the current EPSS score of 0.938 indicates a very high probability of in-the-wild exploitation activity.

Affected Products

Because SAP Web Dispatcher is commonly deployed as the public-facing reverse proxy for SAP landscapes, vulnerable installations are frequently directly exposed to the internet, amplifying exposure across enterprise environments.

Exploitation Evidence

ATT&CK Mapping

No formal ATT&CK mappings are present in the source database. Based on the technical nature of the flaw, the following techniques are analytically relevant:

Threat Actor Context

No specific threat actor attribution is recorded in the source database for this CVE. However, SAP systems are routine targets for financially motivated intrusion sets and state-aligned operators interested in ERP data, financial records, and intellectual property. Given the inclusion in CISA KEV and the availability of public exploit code, both opportunistic mass scanning and targeted exploitation should be assumed. Organizations should treat any exposed and unpatched SAP front-end as a high-probability intrusion vector.

Recommended Actions