First published: Tue Feb 14 2023(Updated: )
In SAP GRC (Process Control) - versions GRCFND_A V1200, GRCFND_A V8100, GRCPINW V1100_700, GRCPINW V1100_731, GRCPINW V1200_750, remote-enabled function module in the proprietary SAP solution enables an authenticated attacker with minimal privileges to access all the confidential data stored in the database. Successful exploitation of this vulnerability can expose user credentials from client-specific tables of the database, leading to high impact on confidentiality.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP GRC Process Control | =v1100_700 | |
SAP GRC Process Control | =v1100_731 | |
SAP GRC Process Control | =v1200 | |
SAP GRC Process Control | =v1200_750 | |
SAP GRC Process Control | =v8100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0019 is considered a high severity vulnerability due to the potential unauthorized access to confidential data.
To fix CVE-2023-0019, you should apply the latest security patches provided by SAP for your GRC Process Control version.
CVE-2023-0019 affects SAP GRC Process Control versions GRCFND_A V1200, GRCFND_A V8100, and GRCPINW versions detailed in the vulnerability description.
An authenticated attacker with minimal privileges can exploit CVE-2023-0019 to access confidential data.
CVE-2023-0019 impacts SAP GRC Process Control specifically versions V1100_700, V1100_731, V1200, and V1200_750.