First published: Tue May 11 2021(Updated: )
In specific situations SAP GUI for Windows until and including 7.60 PL9, 7.70 PL0, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP GUI for Windows | =7.60 | |
SAP GUI for Windows | =7.60-patch_level1 | |
SAP GUI for Windows | =7.60-patch_level2 | |
SAP GUI for Windows | =7.60-patch_level3 | |
SAP GUI for Windows | =7.60-patch_level4 | |
SAP GUI for Windows | =7.60-patch_level5 | |
SAP GUI for Windows | =7.60-patch_level6 | |
SAP GUI for Windows | =7.60-patch_level7 | |
SAP GUI for Windows | =7.60-patch_level8 | |
SAP GUI for Windows | =7.60-patch_level8_hotfix1 | |
SAP GUI for Windows | =7.60-patch_level9 | |
SAP GUI for Windows | =7.70 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27612 is considered a high-severity vulnerability due to its potential for leading users to malicious websites.
To fix CVE-2021-27612, update SAP GUI for Windows to version 7.60 PL10 or 7.70 PL1 or later.
CVE-2021-27612 affects SAP GUI for Windows versions up to and including 7.60 PL9 and 7.70 PL0.
CVE-2021-27612 can enable phishing attacks or delivery of malware by redirecting users to malicious websites.
There are no recommended workarounds for CVE-2021-27612; users should upgrade to the latest versions.