First published: Tue Apr 11 2023(Updated: )
A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP ERP (SAP S/4HANA) | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29187 has a high severity rating due to its potential for privilege escalation on Windows systems.
To fix CVE-2023-29187, users should update to the latest version of SAP Setup that addresses this vulnerability.
CVE-2023-29187 affects Windows users running SAP Setup version 9.0.
CVE-2023-29187 involves a DLL hijacking attack that allows for privilege escalation.
Exploiting CVE-2023-29187 can allow an attacker to execute code with administrator privileges on the affected Windows PC.