First published: Tue Dec 13 2022(Updated: )
Due to the unrestricted scope of the RFC function module, SAP BASIS - versions 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, 791, allows an authenticated non-administrator attacker to access a system class and execute any of its public methods with parameters provided by the attacker. On successful exploitation the attacker can have full control of the system to which the class belongs, causing a high impact on the integrity of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Basis | =7.31 | |
SAP Basis | =7.40 | |
SAP Basis | =7.50 | |
SAP Basis | =7.51 | |
SAP Basis | =7.52 | |
SAP Basis | =7.53 | |
SAP Basis | =7.54 | |
SAP Basis | =7.55 | |
SAP Basis | =7.56 | |
SAP Basis | =7.57 | |
SAP Basis | =7.89 | |
SAP Basis | =7.90 | |
SAP Basis | =7.91 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-41264 is high with a severity value of 8.8.
SAP BASIS versions 7.31, 7.40, 7.50, 7.51, 7.52, 7.53, 7.54, 7.55, 7.56, 7.57, 7.89, 7.90, and 7.91 are affected by CVE-2022-41264.
An authenticated non-administrator attacker can exploit CVE-2022-41264 by accessing a system class and executing any of its public methods with parameters provided by the attacker.
The CWE ID for CVE-2022-41264 is CWE-94.
You can find more information about CVE-2022-41264 at the following references: [Reference 1](https://launchpad.support.sap.com/#/notes/3268172), [Reference 2](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).