First published: Tue Jun 14 2022(Updated: )
A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Sybase Adaptive Server Enterprise | =16.0 | |
SAP Sybase Adaptive Server Enterprise | =kernel_7.22 | |
SAP Sybase Adaptive Server Enterprise | =kernel_7.49 | |
SAP Sybase Adaptive Server Enterprise | =kernel_7.53 | |
SAP Sybase Adaptive Server Enterprise | =krnl64nuc_7.22 | |
SAP Sybase Adaptive Server Enterprise | =krnl64nuc_7.22ext | |
SAP Sybase Adaptive Server Enterprise | =krnl64nuc_7.49 | |
SAP Sybase Adaptive Server Enterprise | =krnl64uc_7.22 | |
SAP Sybase Adaptive Server Enterprise | =krnl64uc_7.22ext | |
SAP Sybase Adaptive Server Enterprise | =krnl64uc_7.49 | |
SAP Sybase Adaptive Server Enterprise | =krnl64uc_7.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31594 is considered a high severity vulnerability due to its potential to allow privilege escalation to root on local Unix systems.
To fix CVE-2022-31594, update your SAP Adaptive Server Enterprise to the latest recommended version as per SAP security guidelines.
CVE-2022-31594 affects users of SAP Adaptive Server Enterprise versions 16.0 and various kernel versions including 7.22, 7.49, and 7.53.
CVE-2022-31594 requires local access to the affected systems, making it an exploit for local privilege escalation rather than remote exploitation.
If exploited, CVE-2022-31594 allows a highly privileged user to elevate their privileges to root, potentially compromising the entire system.