First published: Tue Feb 14 2023(Updated: )
An attacker authenticated as a non-admin user with local access to a server port assigned to the SAP Host Agent (Start Service) - versions 7.21, 7.22, can submit a crafted ConfigureOutsideDiscovery request with an operating system command which will be executed with administrator privileges. The OS command can read or modify any user or system data and can make the system unavailable.
Credit: cna@sap.com cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Host Agent | =7.21 | |
Sap Host Agent | =7.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24523 is a vulnerability that allows an authenticated non-admin user with local access to a server port assigned to the SAP Host Agent (Start Service) to execute arbitrary commands with administrator privileges.
Versions 7.21 and 7.22 of SAP Host Agent are affected by CVE-2023-24523.
CVE-2023-24523 has a severity rating of 8.8 (high).
An attacker can exploit CVE-2023-24523 by submitting a crafted ConfigureOutsideDiscovery request with an operating system command, which will be executed with administrator privileges.
Yes, you can refer to the following sources for more information about CVE-2023-24523: [SAP Note 3285757](https://launchpad.support.sap.com/#/notes/3285757) and [SAP Security Note](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).