Lucene search

K
cvelistSapCVELIST:CVE-2020-6364
HistoryOct 15, 2020 - 1:55 a.m.

CVE-2020-6364

2020-10-1501:55:24
sap
www.cve.org

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.7%

SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability.

CNA Affected

[
  {
    "product": "SAP Solution Manager (CA Introscope Enterprise Manager) and SAP Focused Run (CA Introscope Enterprise Manager)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< WILY_INTRO_ENTERPRISE 9.7"
      },
      {
        "status": "affected",
        "version": "< 10.1"
      },
      {
        "status": "affected",
        "version": "< 10.5"
      },
      {
        "status": "affected",
        "version": "< 10.7"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.7%

Related for CVELIST:CVE-2020-6364