First published: Tue Jan 12 2021(Updated: )
SAP GUI for Windows, version - 7.60, allows an attacker to spoof logon credentials for Application Server ABAP backend systems in the client PCs memory. Under certain conditions the attacker can access information which would otherwise be restricted. The exploit can only be executed locally on the client PC and not via Network and the attacker needs at least user authorization of the Operating System user of the victim.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Graphical User Interface | =7.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21448 has been classified as a high-severity vulnerability due to its potential to allow local credential spoofing.
To mitigate CVE-2021-21448, update your SAP GUI for Windows to version 7.60 or later as recommended by SAP.
CVE-2021-21448 affects SAP GUI for Windows version 7.60, specifically targeting Application Server ABAP backend systems.
CVE-2021-21448 cannot be exploited remotely as it requires local access to the affected systems.
Exploitation of CVE-2021-21448 could lead to unauthorized access to sensitive data and restricted information on ABAP backend systems.