An attacker who gains local membership to sapsys group could replace local files usually protected by privileged access. On successful exploitation the attacker could cause high impact on confidentiality and integrity of the application.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3509619 | Permissions Required |
https://url.sap/sapsecuritypatchday | Vendor Advisory |
Configurations
History
14 Nov 2024, 15:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://me.sap.com/notes/3509619 - Permissions Required | |
References | () https://url.sap/sapsecuritypatchday - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:sap:host_agent:7.22:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Sap
Sap host Agent |
12 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-12 01:15
Updated : 2024-11-14 15:21
NVD link : CVE-2024-47595
Mitre link : CVE-2024-47595
CVE.ORG link : CVE-2024-47595
JSON object : View
Products Affected
sap
- host_agent
CWE