First published: Tue May 09 2023(Updated: )
SAP GUI for Windows - version 7.70, 8.0, allows an unauthorized attacker to gain NTLM authentication information of a victim by tricking it into clicking a prepared shortcut file. Depending on the authorizations of the victim, the attacker can read and modify potentially sensitive information after successful exploitation.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP GUI for Windows | =7.70 | |
SAP GUI for Windows | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-32113.
The severity of CVE-2023-32113 is critical with a severity value of 9.3.
SAP GUI for Windows versions 7.70 and 8.0 are affected by CVE-2023-32113.
An attacker can exploit CVE-2023-32113 by tricking a victim into clicking a prepared shortcut file, allowing the attacker to gain NTLM authentication information.
Yes, you can find references for CVE-2023-32113 at the following links: [Link 1](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) and [Link 2](https://launchpad.support.sap.com/#/notes/3320467).