First published: Tue Jul 12 2022(Updated: )
The application SAP Enterprise Extension Defense Forces & Public Security - versions 605, 606, 616,617,618, 802, 803, 804, 805, 806, does not perform necessary authorization checks for an authenticated user over the network, resulting in escalation of privileges leading to a limited impact on confidentiality.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Enterprise Extension Defense Forces \& Public Security | =605 | |
Sap Enterprise Extension Defense Forces \& Public Security | =606 | |
Sap Enterprise Extension Defense Forces \& Public Security | =616 | |
Sap Enterprise Extension Defense Forces \& Public Security | =617 | |
Sap Enterprise Extension Defense Forces \& Public Security | =618 | |
Sap Enterprise Extension Defense Forces \& Public Security | =802 | |
Sap Enterprise Extension Defense Forces \& Public Security | =803 | |
Sap Enterprise Extension Defense Forces \& Public Security | =804 | |
Sap Enterprise Extension Defense Forces \& Public Security | =805 | |
Sap Enterprise Extension Defense Forces \& Public Security | =806 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31592 is considered to have a limited impact on confidentiality due to the lack of necessary authorization checks.
To fix CVE-2022-31592, it is recommended to apply the appropriate security patches provided by SAP for affected versions.
CVE-2022-31592 affects versions 605, 606, 616, 617, 618, 802, 803, 804, 805, and 806 of SAP Enterprise Extension Defense Forces & Public Security.
CVE-2022-31592 can be exploited by authenticated users to escalate privileges due to insufficient authorization checks.
There are currently no recommended workarounds for CVE-2022-31592 other than updating to the patched versions released by SAP.