First published: Tue Mar 08 2022(Updated: )
Due to missing authorization check, SAP NetWeaver Application Server for ABAP - versions 700, 701, 702, 731, allows an authenticated attacker, to access content on the start screen of any transaction that is available with in the same SAP system even if he/she isn't authorized for that transaction. A successful exploitation could expose information and in worst case manipulate data before the start screen is executed, resulting in limited impact on confidentiality and integrity of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =700 | |
SAP NetWeaver Application Server ABAP | =701 | |
SAP NetWeaver Application Server ABAP | =702 | |
SAP NetWeaver Application Server ABAP | =731 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-26102.
The severity of CVE-2022-26102 is medium, with a severity value of 5.4.
The affected software is SAP NetWeaver Application Server for ABAP, specifically versions 700, 701, 702, and 731.
The impact of CVE-2022-26102 is that an authenticated attacker can access content on the start screen of any transaction in the SAP system, even if they are not authorized for that transaction.
To fix CVE-2022-26102, apply the necessary patches and updates provided by SAP.