Lucene search

K
cve[email protected]CVE-2023-32112
HistoryMay 09, 2023 - 2:15 a.m.

CVE-2023-32112

2023-05-0902:15:12
CWE-862
web.nvd.nist.gov
15
cve-2023-32112
nvd
sap_appl
s4core
authorization
data integrity

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

5.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user toΒ access some of its function. This could lead to modification of data impacting the integrity of the system.

Affected configurations

NVD
Node
saps4coreMatch100
OR
sapvendor_master_hierarchyMatchsap_appl_500
OR
sapvendor_master_hierarchyMatchsap_appl_600
OR
sapvendor_master_hierarchyMatchsap_appl_602
OR
sapvendor_master_hierarchyMatchsap_appl_603
OR
sapvendor_master_hierarchyMatchsap_appl_604
OR
sapvendor_master_hierarchyMatchsap_appl_605
OR
sapvendor_master_hierarchyMatchsap_appl_606
OR
sapvendor_master_hierarchyMatchsap_appl_616
OR
sapvendor_master_hierarchyMatchsap_appl_617
OR
sapvendor_master_hierarchyMatchsap_appl_618

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Vendor Master Hierarchy",
    "vendor": "SAP_SE",
    "versions": [
      {
        "status": "affected",
        "version": "SAP_APPL 500"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 600"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 602"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 603"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 604"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 605"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 606"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 616"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 617"
      },
      {
        "status": "affected",
        "version": "SAP_APPL 618"
      },
      {
        "status": "affected",
        "version": "S4CORE 100"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

5.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-32112