Lucene search

K
cvelistSapCVELIST:CVE-2020-26830
HistoryDec 09, 2020 - 4:29 p.m.

CVE-2020-26830

2020-12-0916:29:34
sap
www.cve.org
2
sap
solution manager
authorization checks
authenticated user
access control
network attacker
administrators
user experience monitoring
configuration
agents
malicious script

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

AI Score

8

Confidence

High

EPSS

0.001

Percentile

45.6%

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience Monitoring configuration, obtain details about the configured SAP Solution Manager agents, Deploy a malicious User Experience Monitoring script.

CNA Affected

[
  {
    "product": "SAP Solution Manager (User Experience Monitoring)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< 7.20"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

AI Score

8

Confidence

High

EPSS

0.001

Percentile

45.6%

Related for CVELIST:CVE-2020-26830