Lucene search

K

Host Agent Security Vulnerabilities - 2023

cve
cve

CVE-2023-0012

In SAP Host Agent (Windows) - versions 7.21, 7.22, an attacker who gains local membership to SAP_LocalAdmin could be able to replace executables with a malicious file that will be started under a privileged account. Note that by default all user members of SAP_LocaAdmin are denied the ability to lo...

6.7CVSS

6.2AI Score

0.0004EPSS

2023-01-10 03:15 AM
32
cve
cve

CVE-2023-24523

An attacker authenticated as a non-admin user with local access to a server port assigned to the SAP Host Agent (Start Service) - versions 7.21, 7.22, can submit a crafted ConfigureOutsideDiscovery request with an operating system command which will be executed with administrator privileges. The OS...

8.8CVSS

8.2AI Score

0.0004EPSS

2023-02-14 04:15 AM
34
cve
cve

CVE-2023-27498

SAP Host Agent (SAPOSCOL) - version 7.22, allows an unauthenticated attacker with network access to a server port assigned to the SAP Start Service to submit a crafted request which results in a memory corruption error. This error can be used to reveal but not modify any technical information about...

7.2CVSS

7AI Score

0.001EPSS

2023-03-14 06:15 AM
29
cve
cve

CVE-2023-36926

Due to missing authentication check in SAP Host Agent - version 7.22, an unauthenticated attacker can set an undocumented parameter to a particular compatibility value and in turn call read functions. This allows the attacker to gather some non-sensitive information about the server. There is no im...

5.3CVSS

5.3AI Score

0.001EPSS

2023-08-08 01:15 AM
28
cve
cve

CVE-2023-40308

SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information.

7.5CVSS

7.7AI Score

0.001EPSS

2023-09-12 02:15 AM
41
cve
cve

CVE-2023-40309

SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality ...

9.8CVSS

9.5AI Score

0.002EPSS

2023-09-12 03:15 AM
57