First published: Thu Mar 23 2017(Updated: )
SAP GUI 7.2 through 7.5 allows remote attackers to bypass intended security policy restrictions and execute arbitrary code via a crafted ABAP code, aka SAP Security Note 2407616.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP GUI for Windows | =7.20 | |
SAP GUI for Windows | =7.30 | |
SAP GUI for Windows | =7.40_core_sp00-sp011 | |
SAP GUI for Windows | =7.50_core_sp000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6950 is considered a high-severity vulnerability allowing remote code execution.
To fix CVE-2017-6950, you should upgrade to a patched version of SAP GUI, specifically newer than 7.5.
CVE-2017-6950 allows attackers to execute arbitrary code by bypassing security restrictions using crafted ABAP code.
CVE-2017-6950 affects SAP GUI versions 7.20, 7.30, 7.40_core_sp00-sp011, and 7.50_core_sp000.
The impact of CVE-2017-6950 on SAP users includes potential unauthorized access and manipulation of sensitive data.