First published: Tue Nov 13 2018(Updated: )
In some SAP standard roles, in SAP_ABA versions, 7.00 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, 75C to 75D, a transaction code reserved for customer is used. By implementing such transaction code a malicious user may execute unauthorized transaction functionality.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Advanced Business Application Programming | >=7.00<=7.02 | |
SAP Advanced Business Application Programming | >=7.10<=7.11 | |
SAP Advanced Business Application Programming | =7.30 | |
SAP Advanced Business Application Programming | =7.31 | |
SAP Advanced Business Application Programming | =7.40 | |
SAP Advanced Business Application Programming | =7.50 | |
SAP Advanced Business Application Programming | =75c | |
SAP Advanced Business Application Programming | =75d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2481 has a critical severity level due to the potential for unauthorized transaction execution.
To fix CVE-2018-2481, ensure you apply the latest security patches provided by SAP for the affected versions of your software.
CVE-2018-2481 affects SAP_ABA versions 7.00 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, 75C, and 75D.
With CVE-2018-2481, a malicious user can exploit a reserved transaction code to execute unauthorized transactions.
Currently, the recommended approach for CVE-2018-2481 is to apply the necessary patches, as no formal workaround has been suggested.